Information System Breakdown Response Procedures

In: Other Topics

Submitted By shah78
Words 827
Pages 4
Purpose: This procedure is to enable breakdown on information communication technology (ICT) are attended to and be rectified in timely manner in order to minimise delay in communication and processing of works.

Scope: This procedure is applicable to all types of ICT which include, - computer server; - computer hardware; - computer software; - computer network (wireless/ local area network (LAN)); - internet system; - email system; - PABX/ telephone system; - fax machine; - photocopy machine; - printers (associated with photocopy machine); - scanner (associated with photocopy machine).

1.0 Reporting ICT Breakdown

1.1 Whenever there is breakdown encountered to any of the ICT in the office, the staff in charge shall complete the ICT Breakdown Report which to include clearly the ICT Name, Model No./ Serial No., Location, Breakdown Date and Time, Nature of Breakdown and refer by faxing/ handing over as soon as possible to the following personnel authorised to attend to the breakdown.

1. Refer to IT Technician for breakdown of, - computer hardware; - computer software; - computer network (wireless/ local area network (LAN)); - internet system; - email system;

1.1.2 Refer to Admin Manager for breakdown of, - PABX system/ telephone system; - fax machine; - photocopy machine; - printers (associated with photocopy machine); - scanner (associated with photocopy machine).

2.0 Investigation of Cause and Rectification

2.1 For any breakdown report for items 1.1.1 as soon as received from ICT user, the IT Technician shall attend to the reported breakdown within 30 minutes from the time of receiving such reporting and investigate the cause of breakdown and provide rectification if the spare…...

Similar Documents

Accounting Information Systems

... |Accounting Information Systems I | Copyright © 2009, 2007, 2005, 2004, 2003, 2001 by University of Phoenix. All rights reserved. Course Description This course is designed to provide accounting students with the proper mix of technical information and real-world applications. Areas of study include fundamental concepts and technologies (what computers can do for business), the Internet, intranets, electronic commerce, information systems development, basic project management principles, decision support systems, and the benefits of computer and human synergy. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Bagranoff, N. A., Simkin, M. G., & Strand, C. S. (2008). Core concepts of accounting information systems (10th ed.). New York, NY: John Wiley & Sons. All electronic......

Words: 3264 - Pages: 14

Breakdown of Congress System

...their ears at the mention of Private Ryan. Captain hamill We're supposed to tell you, they intercepted a German transmission after you left. The Krauts have two companies on their way to Ramelle to take back that bridge, they'll be there sometime late tomorrow. MILLER Wonderful. Captain Hamill If Ryan's alive, you'd better get him the hell out of there before those Krauts show up. MILLER How do we get out of here? Captain hamill You don't, until tonight, we're hemmed in real tight. After dark you try to slip out to the east. If you tip-toe, stay off the main roads and roll a few sevens, you've got a fair chance of making it up to Ramelle by tomorrow night. Miller processes the information. Captain Hamill shakes his head. Captain hamill Tough, huh? Three brothers? Miller shrugs. Captain hamill We sure as hell could use your help here, but I understand what you're doing? MILLER Yeah? Captain hamill Good luck. MILLER Thanks. Captain hamill I mean it. Find him. Get him home. Miller is a bit taken aback by Captain Hamill's forceful sincerity. Then he shakes it off and motions to his men. MILLER Let's find someplace to hole up. Miller nods to Captain Hamill, then, as he moves to the head of the alley, Miller passes Upham. UPHAM Sir, I'm sorry about what happened, I... MILLER (interrupting) It was......

Words: 22481 - Pages: 90

Management of Information Systems

...Securing Information Systems Objectives • Why are information systems vulnerable to destruction, error, and abuse? • What is the business value of security and control? • What are the components of an organizational framework for security and control? • Evaluate the most important tools and technologies for safeguarding information resources. Online Games Need Security, Too • Problem: Threat of attacks from hackers hoping to steal information or gaming assets. • Solutions: Deploy an advanced security system to identify threats and reduce hacking attempts. • NetContinuum’s NC-2000 AG firewall and Cenzic’s ClickToSecure service work in tandem to minimize the chance of a security breach. • Demonstrates IT’s role in combating cyber crime. • Illustrates digital technology’s role in achieving security on the Web. [pic] System Vulnerability and Abuse • An unprotected computer connected to Internet may be disabled within seconds • Security: • Policies, procedures and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems • Controls: • Methods, policies, and organizational procedures that ensure safety of organization’s assets; accuracy and reliability of its accounting records; and operational adherence to management standards Why Systems Are Vulnerable • Hardware problems • Breakdowns, configuration errors, damage......

Words: 1747 - Pages: 7

Information System

...key skills and characteristic should an information system manager posses. b) Today’s Point of Sales – Electronic Fund Transfer (POS-EFT) system requires several components to function. List and discuss the function for these components. a) An Information System (IS) manager has two principle roles within an organization. He has to be able to manage the change processes that are inevitably initiated by the introduction of technology into his workplace, and he has to manage the operational aspects of business and organizational activities founded on computing and communication technology. Hence an IS manager is a leading figure in both organizational change and performance. From this definition, it is a natural deduction that for IS manager to work effectively, they must have or need to be: * Detailed knowledge of the organization’s mission and vision, its peculiar business strategies and implementation skills. With these understanding, the IS manager will then be able to design an information system which can help the organization to achieve its goal. * Skilled in inter-personal management. This consists of communication skills both written and oral, people oriented and also negotiation skill. Regardless of how an organization structures its information system department, system development is a team effort. So learning how to work and communicate effectively with other team members is important for any information system professionals. * Good self......

Words: 1563 - Pages: 7

Information Systems

...Like other networks, the Intranet is mainly used to share data, information, resources, company programs, software applications. Intranet improves the data sharing capability and overall knowledge base of the company’s employees (Difference between Intranet and Extranet). Extranet, is an internal network that can be accessed externally. The extranet is the extension of the company’s intranet where People from outside the company can have a limited access to the company’s internal network for business related purposes. This access is usually granted to the organization’s partners, vendors and potential customers etc (Difference between Intranet and Extranet). Security-wise, Intranets are a lot more secure due to the limited interface with the Internet. Extranets are made less secure not only by the use of the Internet as a medium but also by the fact that the administrators of the Intranet have no control over the networks that connect to the Extranet. When sensitive information is being transmitted on the Intranet, all parties need to take all security precautions to prevent spying and other similar activities (Difference between Intranet and Extranet). The main difference between an intranet and an extranet is that the intranet is the network that is limited for use on the organizations computers, whereas the extranet is an extension of the company’s intranet. The extranet make available some of the information of the intranet to people not directly connected to the......

Words: 3485 - Pages: 14

Information System

...Chapter 3 Information Systems, Organizations, and Strategy LEARNING OBJECTIVES After reading this chapter, you will be able to: 1. Identify and describe important features of organizations that managers need to know about in order to build and use information systems successfully. 2. Evaluate the impact of information systems on organizations. 3. Demonstrate how Porter’s competitive forces model and the value chain model help businesses use information systems for competitive advantage. 4. Demonstrate how information systems help businesses use synergies, core competencies, and network-based strategies to achieve competitive advantage. 5. Assess the challenges posed by strategic information systems and management solutions. 3.4 CHAPTER OUTLINE 3.1 ORGANIZATIONS AND INFORMATION SYSTEMS What Is an Organization? Features of Organizations HOW INFORMATION SYSTEMS IMPACT ORGANIZATIONS AND BUSINESS FIRMS Economic Impacts Organizational and Behavioral Impacts The Internet and Organizations Implications for the Design and Understanding of Information Systems USING INFORMATION SYSTEMS TO ACHIEVE COMPETITIVE ADVANTAGE Porter’s Competitive Forces Model Information System Strategies for Dealing with Competitive Forces The Internet’s Impact on Competitive Advantage The Business Value Chain Model Synergies, Core Competencies, and Network-Based Strategies USING SYSTEMS FOR COMPETITIVE ADVANTAGE: MANAGEMENT ISSUES Sustaining Competitive Advantage Performing a Strategic Systems......

Words: 19830 - Pages: 80

Business Information Systems

...monitoring system Ioannis N. Athanasiadis and Pericles A. Mitkas ABSTRACT Fairly rapid environmental changes call for continuous surveillance and on- line decision- making. Two areas where IT technologies can be valuable. In this paper we present a multi-agent system for monitoring and assessing air-quality attributes, which uses data coming from a meteorological station. A community of software agents is assigned to monitor and validate measurements coming from several sensors, to assess air-quality, and, finally, to fire alarms to appropriate recipients, when needed. Data mining techniques have been used for adding data-driven, customized intelligence into agents. The architecture of the developed system, its domain ontology, and typical agent interactions are presented. Finally, the deployment of a real-world test case is demonstrated. Keywords : Multi-Agent Systems, Intelligent Applications, Data Mining, Inductive Agents, Air-Quality Monitoring Introduction Environmental Information Systems (EIS) is a generic term that describes the class of systems that perform one or more of the following tasks: environmental monitoring, data storage and access, disaster description and response, environmental reporting, planning and simulation, modeling and decision- making. As the requirements for accurate and timely information in these systems are increasing, the need for incorporating advanced, intelligent features in EIS is revealed. In this context advances in Information......

Words: 4327 - Pages: 18

Information System

...transmission of voice |   | B. | network control |   | C. | tracking of out-of-service devices (Your Answer) |   | D. | transmission of data |   | E. | All of the above are primary functions of telecommunication (Correct Answer) | Incorrect | | |   Q.2) | Which of the following most accurately describes the INTERFACE function of telecommunications? |   | |   | A. | checking for errors and putting the communicaiton into a standardized format |   | B. | handing interactions between users and the network (Correct Answer) |   | C. | keeping track of the status of the network (Your Answer) |   | D. | choosing the most efficient path for a message to be sent over the Internet |   | E. | changing coding system or speed when moving data between devices on the network | Incorrect | | |   Q.3) | Which of the following is NOT a characterisitic of fiber-optic transmission? |   | |   | A. | faster transmission than twisted pair of wires |   | B. | more secure than other media because it does not emit radiation |   | C. | requires much less space because the fiber-optic cable is very small in diameter (Your Answer) |   | D. | easy to work with the tiny fiber and require much cheaper equipment (Correct Answer) |   | E. | not affected by power-line surges or electromagnetic interference | Correct | | |   Q.4) | What is a key characteristic of a dedicated line versus a switched line? |   |......

Words: 21426 - Pages: 86

Information System

...Chapter 2 E:Business: How Businesses Use Information Systems Student Objectives 1. Identify and describe the major features of a business that are important for understanding the role of information systems. 2. Describe the information systems supporting the major business functions: sales and marketing, manufacturing and production, finance and accounting, and human resources. 3. Evaluate the role played by systems serving the various levels of management in a business and their relationship to each other. 4. Explain how enterprise applications collaboration and communication systems, and intranets improve organizational performance. 5. Assess the role of the information systems function in a business. Chapter Outline 1 Components of a Business Organizing a Business: Basic Business Functions Business Processes Managing a Business and Firm Hierarchies The Business Environment The Role of Information Systems in a Business 2.2 Types of Business Information Systems Systems from a Functional Perspective Systems from a Constituency Perspective Relationship of Systems to One Another 2.3 Systems That Span the Enterprise Enterprise Applications Intranets and Extranets E-Business, E-Commerce and E-Government 4. The Information Systems Function in Business The Information Systems Department Organizing the Information Systems Function 2.5 Hands-on MIS Key Terms The following alphabetical list......

Words: 10114 - Pages: 41

Control Modes System Response

... Control Systems & Automation Control Modes and System Response Contents Introduction 3 Brief 3 Tasks 4 Task 1 4 Task 2 9 Task 3 12 Task 4 15 Appendix 24 Introduction In practical applications of controlling systems, engineers need to understand the basic modes of control, the response that these modes of control produce in terms of control accuracy and response time, and how to successfully adjust the parameters of a controller to give optimal response for input load changes. 1 Brief This assessment relates to outcome 4 ‘ Describe process control terminology, describe control action and examine several controller tuning techniques.’ Tasks 1 Task 1 1. Using a computer based controller, explain the theory associated with proportional only control, carry out tests using a proportional only controller and draw conclusions about the controllers output response as detailed in the attached experiment sheet (worksheet 1). Proportional only control – Worksheet 1 Objective: The aim of this simulation is to: • Discover the relationship between the value of gain (K) and the magnitude of offset in a P only controller. • Discover the relationship between the value of gain (K) and the stability of control for a P only controller. Procedure: First find the ‘PID Control Simulator’ folder in the Control Systems &......

Words: 3085 - Pages: 13

Information Systems

...arrangements, structures, procedures, processes and capacity and the location of the HRDSA, 2001, at both the then Departments of Education and Labour, severely hampered the implementation and effective functioning of the Strategy. This study aims to find solutions to the main implementation difficulties experienced with the HRDSA, 2001, in order to ensure increased performance regarding the strategic priorities of the revised HRDSA, 2010 - 2030. An empirical study was conducted to determine potential challenges pertaining to the implementation of the revised HRDSA. Interviews were conducted with senior officials and experts at relevant national departments and with the Gauteng Provincial Government and social partners and relevant stakeholders, including organised labour and organised business. Questionnaires distributed among human resource development (HRD) practitioners addressed matters pertaining to possible solutions with regard to the appropriate location of the HRDSA, challenges in implementing the HRDSA, capacity needs, appropriate governance structures, political support and budgetary constraints. Best practice for the implementation of a national HRD strategy in a number of countries is outlined and discussed with a view to benchmarking the HRDSA and learning from the mistakes made by them in the implementation of their national HRD strategies. Based on these lessons learnt by those countries, and valuable information......

Words: 38361 - Pages: 154

Information Systems

...influencing the shape of the new situation or system • And doesn’t have to deal with so much change that there are no anchor points for those involved. Q2 You are the project manager for a new management accounting system that will provide monthly profit and loss accounts to a chain of 30 computer dealerships, each of which is franchised to its local owner/manager. They have all done their own accounting before. What change issues would you expect to encounter? Does the fact that they are PC dealerships make any difference? Why might they have joined together in the chain? Several change issues will arise; • the imperative to change? Why does the franchise owner want to impose this change – if indeed it is being imposed? • meeting the many and varied individual needs • the implementation process • the changeover process • post implementation support • the nature of the franchisee’s response and the resistance if any In principle, the fact that they are PC dealerships should make little difference, but they will be well aware of the problems of changing over from one software system to another, and interfacing it to other existing systems. The dealers probably joined the franchise network in the first place to share purchasing, advertising and marketing costs. They may pay the franchise owner according to their success, in which case the new system may have a big impact on them as it will declare financial information in a consistent manner across all......

Words: 15719 - Pages: 63

Information Systems

...© Cengage Learning. All rights reserved. No distribution allowed without express authorization. chapter 1 Introduction to Information Security Do not figure on opponents not attacking; worry about your own lack of preparation. BOOK OF THE FIVE RINGS For Amy, the day began like any other at the Sequential Label and Supply Company (SLS) help desk. Taking calls and helping office workers with computer problems was not glamorous, but she enjoyed the work; it was challenging and paid well. Some of her friends in the industry worked at bigger companies, some at cutting-edge tech companies, but they all agreed that jobs in information technology were a good way to pay the bills. The phone rang, as it did on average about four times an hour and about 28 times a day. The first call of the day, from a worried user hoping Amy could help him out of a jam, seemed typical. The call display on her monitor gave some of the facts: the user’s name, his phone number, the department in which he worked, where his office was on the company campus, and a list of all the calls he’d made in the past. “Hi, Bob,” she said. “Did you get that document formatting problem squared away?” “Sure did, Amy. Hope we can figure out what’s going on this time.” “We’ll try, Bob. Tell me about it.” “Well, my PC is acting weird,” Bob said. “When I go to the screen that has my e-mail program running, it doesn’t respond to the mouse or the keyboard.” “Did you try a reboot yet?” 1 Chapter...

Words: 15965 - Pages: 64

P4 - Describe the Procedure for Storing Scientific Information in Laboratory Information Management System

...P4 A Laboratory Information Management System (LIMS) is programming that permits you to adequately oversee tests and related information to enhance lab effectiveness. LIMS is programming that permits you to viably oversee tests and related information to enhance lab proficiency. By utilizing a LIMS, your lab can mechanize work processes, coordinate instruments, and oversee tests and related data. Labs utilizing LIMS help their level of polished skill and their capacity to take care of client demand in two ways: * LIMS helps labs produce exact, reproducible results quicker and all the more dependably * LIMS makes information from sequencing runs simpler to store, track, and survey after some time and crosswise over investigations with the goal that labs can assess and enhance operational effectiveness The fundamental component of a LIMS is the administration of tests which comprises of registering and tracking them. After the sample container arrival and registration, the LIMS tracks it and records its area. This may include printing barcodes to recognize the sample compartments. In any case, it is likewise used to build the measure of integration with instruments and applications what is done by making documents which will lead the operations on the example; and to record and trade electronic data what should be possible through Oracle, SQL and Microsoft Access database. Information can be entered into the LIMS by uploading laboratory instrument generated......

Words: 331 - Pages: 2

Congress System and It’s Breakdown

...Congress System and It’s breakdown After independence and before 1967, the Congress was in a dominant position and this period normally referred as a “Congress Dominated System” or “Congress System”. Congress was a dominant force under the leadership of a majestic personality like Nehru and formed governments in centre and in most of the states. After the demise of Nehru, the Congress System started breaking up because of the fights between internal factions and power ambitions. This essay is an attempt to study the reasons behind break down of the congress system. Breakdown of Congress System Congress dominance started crumbling from the mid of 1960s. Fourth general election held in 1967 saw a fall in congress vote share and seats. The party system which emerged from this general election and till 1989 can be termed as a bipolar system where congress was facing a united opposition in almost all the states. This period also witnessed making of many coalition governments in the states where opposition posed a united front to keep congress out of power. One point can be noted here is that the votes of the congress party declined much more drastically in the assembly elections than in parliamentary elections. Following are some of the reasons which can be identified for the breakdown of the Congress systemUnited Opposition: Indian electoral system is a “First past the post” system or in India the candidate who gets the maximum vote wins. Congress never secured more that......

Words: 801 - Pages: 4

Jeroen Jaspaert | Vew full schedule | 11 : الجاسوس-جزء1