CS代写 Topic 1.1.10

Topic 1.1.10
Evaluate different methods of delivering user training
Content adapted by Beijing Huijia Private School Computer Science Department

Copyright By PowCoder代写 加微信 powcoder

Training is important!
• Training end-users in using a new system is very important as productivity greatly depend on how familiar they are with a system.
• Effective user training is an essential part of introducing a new system.
Methods of delivering user training: – Self-instruction
– Formal classes
– Remote/Online training
Content adapted by Beijing Huijia Private School Computer Science Department

Self instruction
• Users can learn how to use a new system on their own, provided they have the right material to learn from.
• It can take the form of reading a manual or watching a tutorial.
Content adapted by Beijing Huijia Private School Computer Science Department

Self instruction
• Advantages: –
– Flexibletimeline
– Training tailored to exactly what users wants to learn
• Disadvantages: –
Lowest cost –
only materials needed, no
teachers/buildings
With no guidance, user might feel
lost/overwhelmed
Unstructured learning means certain features might be
misunderstood/ignored
Content adapted by Beijing Huijia Private School Computer Science Department

Formal classes
• Users sitting in a classroom listening to an instructor who shows and explains how to use the system.
• This type of training is useful to train large amounts of staff as it is effective and relatively cheap, but if the size of the classes is too big, there is little time to deal with individual problems and questions.
Content adapted by Beijing Huijia Private School Computer Science Department

Formal classes
• Advantages:
– Structured learning environment
– Expert on hand to answer questions –
• Disadvantages:
– Expensive – teachers, buildings and facilities needed – Rigid schedule and curriculum
– Not much personalisation possible
Curriculum designed to teach all aspects, including ones
that might be misunderstood or difficult to
Content adapted by Beijing Huijia Private School Computer Science Department

Remote / Online training
• An instructor training one user or a small group of users by some kind of remote connection (Skype, Google Hangouts, Face time, etc.).
• This is the most effective way of training as training can be suited to user’s needs and abilities, while being instructed by a professional that caters to specific needs.
Content adapted by Beijing Huijia Private School Computer Science Department

Remote / Online training
• Advantages:
– Structured learning environment
– Expert on hand to answer questions
– Curriculum designed to teach all aspects, including ones
that might be misunderstood or difficult to grasp
– Flexiblelocations
• Disadvantages:
– Expensive – teachers & internet connection needed – Can feel ‘remote’ with no quick ‘hands on’
– Has to be computer-based
Content adapted by Beijing Huijia Private School Computer Science Department

Topic 1.1.11
Identify a range of causes of data loss
Content adapted by Beijing Huijia Private School Computer Science Department

Content adapted by Beijing Huijia Private School Computer Science Department

Hardware/System malfunctions
Content adapted by Beijing Huijia Private School Computer Science Department

Human error
Examples include: clicking CLOSE instead of SAVE, saving over another file, deleting the wrong file…
Content adapted by Beijing Huijia Private School Computer Science Department

Software corruption
Content adapted by Beijing Huijia Private School Computer Science Department

Malicious software (Viruses)
Content adapted by Beijing Huijia Private School Computer Science Department

Natural disasters
Content adapted by Beijing Huijia Private School Computer Science Department

Topic 1.1.13
Describe can
a range of methods that
be used to prevent data loss
Content adapted by Beijing Huijia Private School Computer Science Department

Key data loss prevention methods
• Failover system
• Redundancy
• Removable media
• Offsite/onlinestorage
Content adapted by Beijing Huijia Private School Computer Science Department

Failover system
• This can be operated in a redundant manner or in a standby operational mode upon the failure of a primary server, application, system or other primary system component.
Failover is the constant capability to automatically
seamlessly switch to a highly reliable backup
Content adapted by Beijing Huijia Private School Computer Science Department

Redundancy
• Data redundancy is a condition created within a database or data storage technology in which the same piece of data is
• This can mean two different fields within a single database, or two different spots in multiple software environments or platforms.
• Whenever data is repeated, this basically constitutes data redundancy.
held in two separate
Content adapted by Beijing Huijia Private School Computer Science Department

Removable media
• Removable media is be
• Examples of removable media include CDs, DVDs and Blu-Ray
disks, as well as tapes and USB drives.
• Removable media makes it easy for a user to move data from one computer to another.
any type of storage device that can
removed from a computer while the system is
Content adapted by Beijing Huijia Private School Computer Science Department

Offsite storage
• An offsite backup is a that backup data or or core IT environment.
• It is similar to a standard backup process, but uses a facility or storage media that is not physically located within the organization’s core infrastructure.
applications
organization
Content adapted by Beijing Huijia Private School Computer Science Department

• Cloud backup is a type of service through which cloud computing resources and infrastructure are used to create, edit, manage and restore data, services or application backup.
• This is done remotely over the internet.
• Cloud backup may also be called online backup or remote backup.
Content adapted by Beijing Huijia Private School Computer Science Department

Topic 1.1.14
Describe strategies for managing releases and updates
Content adapted by Beijing Huijia Private School Computer Science Department

• A product release is the process of launching a new product for a specific market or user base.
• In software development, a product release is sometimes done with a beta version so that core developers/users can assist with debugging and feedback prior to the release of the actual software.
Content adapted by Beijing Huijia Private School Computer Science Department

• An update is a software file that contains fixes for problems found by other users or the software developer.
• Installing an update fixes the code and prevents the problems from happening on your computer.
• Because updates fix problems with a program, they are almost always free and available through the program or the companies website.
Content adapted by Beijing Huijia Private School Computer Science Department

• Typically, a patch is installed into an existing software
• Patches are often temporary fixes between full releases of a software package.
• Patches may do any of the following:
– Fix a software bug
– Install new drivers
– Address new security vulnerabilities
– Address software stability issues
– Upgrade the software
A patch is a software update comprised code inserted (or
patched) into the code of an executable
Content adapted by Beijing Huijia Private School Computer Science Department

How to get updates
• Manually (download and install them yourself)
– Pro: Full control
– Con: Time consuming
Automatically (software automatically contacts the
developer, downloads and installs any
– Pro: Don’t have to think/worry about updates, always up to date
– Con: No control – bad update might crash the system
Content adapted by Beijing Huijia Private School Computer Science Department

程序代写 CS代考 加微信: powcoder QQ: 1823890830 Email: powcoder@163.com