IT End User Support
IT End User Support
1|Page
2|Page
Conclusion....................................................................................................................32
Referencing..................................................................................................................33
Gantt chart....................................................................................................................34
3|Page
4|Page
Solution
Software installation problem, Microsoft Checking the product key in the Microsoft
package product key not working.
official web site and download the key for
particular version of package.
Software Compatible problem, Installing Installing winnows 7 64bit OS can be resolve
Visual studio 2012 in windows 7 32 bit
the problem.
OS.
One of the web systems is down.
6|Page
Monitoring and documenting will help for help desk staff to improve their customer
service to customers. Because when they are monitoring they can track their call for
future tasks. They can find what they have to learn like knowledge about the products,
what are the faults and what are the skills must be improve. Some of the methods are
given below.
8|Page
Call Logging
Call logging is the practice of listening to, recording and assessing interactions
between call center agents and customers. These practices are used for staff training
and development, customer quality control and liability protection.
9|Page
Emails, Chat
Person to Person
Over the Phone
User Manuals
Remotely
Emails, Chat
10|Page
Kayako (www.kayako.com)
SmarterTrack (www.smartertools.com)
ReadyDesk (www.readydesk.com)
Person to Person
This is a way to get help from a person who work in help desk can talk to face to face.
When we want to get help from a help desk staff we can use this method also. If we
want to buy a product and want to know about that product, we can get help from that
person. Talk to each other can resolve the problem easily.
11|Page
Remotely
Remote access is utility software that support help desk staff to control the operations
of users computer remotely over the network connection. When help desk staff using
remotely access to the users computer they can see the users desktop and other
controls. Then directly they can solve the user problems using remotely access.
Example for remote control software:
Team Viewer
Join.me
WebEx Free
GoToMyPC
There is a way to get that customer problem step by step, its call incident management
process. There are 12 steps in this process. Lets see how to work that process.
13|Page
14|Page
problem
Question: How do I delete cookie files?
Problem: My Microsoft office package not working
Complaints: When I installing your software it say system error in my pc
Work orders: Will you upgrade the Adobe Photoshop new version on my pc, that
I can use the latest version with new tools
After this categorize we can define the category of an incident and can capture a
brief description of the incident.
Urgent
High priority
Medium priority
Low priority
High priority incidents are usually serious problems that affect the
productivity of a large number of users
Priority codes may be used to determine response time of support staff
Priority codes may change as an incident is handled
A queue is a waiting line into which incoming incidents are placed when they
cannot be answered immediately.
Queues may be defined for:
1. Priority codes
2. Different products
3. Types of customers
4. Levels of support
15|Page
Figure 3 Desktop
4. If your user name or password enters incorrectly you cant login to the system.
You have to make sure about user name and password before enter in the text
field.
18|Page
If its not working it means system not established the network, then you must have to
trouble shoot the problem. Lets see how to do that step by step.
1. Click Start, and then click Control Panel.
19|Page
When you click the network and sharing center, and then will open a new window.
In that window you can see a link called Fix Network Problem click that link.
20|Page
After that you can see a window call Windows Network Diagnostics.
After complete that Network Diagnostics task you will be able to connect to the
network.
Printing Documents
Before printing from your computer, make sure you have set up your product and
installed its software drivers.
21|Page
4. Select the size of the paper you loaded as the Document Size setting.
5. Select the orientation of your document.
6. Select the type of paper you loaded as the Paper Type setting.
22|Page
7. To print on both sides of the paper, select the 2-Sided Printing checkbox and
select the options you want.
8. To print multiple copies and arrange their print order, select the Copies options.
9. To preview your job before printing, select Print Preview.
10. After all of the settings finished, click the print button.
23|Page
Installing Office
Start the application
Use the menu bars, title bars
Use the tool buttons
Use the save option
Print a document
Use the page setup and paragraph settings
Use the office help system
The training will not provide a complete understanding of the organization and
operations of office 2013, but will focuses on the basic use of office package.
Performance Measures: Trainers should be able to define 75% of simple test.
Trainers should demonstrate a creating a document, as well as editing using tools,
saving the document and print that document.
IT Polices for the New Employee
The trainers will getting an IT polices of the company before entering to the work
place.
Following are the Polices:
network.
No personal computers can be plug in to the company network.
Social networking and Chat rooms sites are not allowed.
Any of company file not allowed to taken without permission.
Not allowed to install software without the permission.
26|Page
Occurrence
Time
Duration
Data
Daily
3.30 P.M
1 Hour
Operation
Monthly
4.30 P.M
1 Hour
Systems
User Accounts
Annually
5.00 P.M
45 Minutes
Weekly
5.30 P.M
30 Minutes
Antivirus
Daily
7.00 A.M
25 Minutes
Software
Operating
Annually
7.00 A.M
1 Hour
Systems
Application
Monthly
7.30 A.M
1 Hour
Softwares
Hardware
Annually
4.30 P.M
2 Hour
Monthly
7.00 A.M
30 Minutes
Monthly
7.00 A.M
30 Minutes
Monthly
Monthly
9.00 A.M
1 Hour
Reports
Annual Reports
Annually
9.00 A.M
1 Hour
Affected
Backups
Accounts
Upgrade
Components
Security
Changing
Passwords
User Access
Permission
Auditing
27|Page
Table 2 Maintains schedule
We can protect the data using online backup system, whatever happened in the
company data not destroy because all of data store in the online system. Every
time these data backup to the system. We can use Cloud system for data storage.
Even when it is a power cut we can use UPS for the system. Then servers never
going offline and all system can work perfectly.
The Recovery Plan
System
Threat
28|Page
Screening
strategy
Response
strategy
Recovery
strategy
Security
system
destroy
Locate system
in secure area
Deploy
guards at
strategic
points
Install and
replace the
units and
sensors
Account
System
Server
failure
Secure
equipment
room, backup
servers
Switch over
to backup
server
Fix or
replace
primary
server
Data Storage
Storage
Backup online
Switch to
Fix or
devices
data storage
the online
replace
backup
storage units
failure
system
29|Page
30|Page
Beisse, F. Guide to Computer User Support for Help Desk and Support
Specialist (5th edition).Course Technology Publishing.
31|Page
32|Page