Preview

Refining Solutions

Good Essays
Open Document
Open Document
947 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Refining Solutions
Refining Solutions
PHL/458
February 27, 2012

Refining Solutions

When in search for a viable solution into refining ideas there are three main steps to follow. According to Vincent R. Ruggiero, the three steps to follow are to work out details by determining exactly how solutions will be applied. The next step is to examine each detail for imperfections, and the last step is to make any improvements that will eliminate the imperfections. In week two the original issue that was faced was a computer glitch and improper operations that hindered work deadlines. There were several reasons to what was causing the computer to act incorrectly. Some of the reasons were viruses, spyware/malware, old system, hard drive being full, and a few other technical issues. Some of the initial solutions that were thought of to include developing a way for IT professionals to provide in home help that allows them to see how the networks on the computers are working and potentially a back up system that automatically stores work onto a mobile flash drive that can be transported. When having to decide what is the best solution for an issue, it is best to start with a checklist. This checklist will be developed from “How can? questions”(Ruggiero, 2009). It is best to start with a basic question, What is the problem at hand?
Attempting to better anticipate computer glitches and improper operations.
Next, stem off from the answer of the first question, how does one better anticipate computer glitches and improper operations?
A program that allows people to see how computers on the network are running, allowing the opportunity for regular maintenance on systems. There is also the ability to contact a professional immediately and have help with any possible problems that might be at hand. Now that the questioned has been answered what methods should be used to better anticipate computer glitches and improper operations, who will be implementing the methods?
IT

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580

    • 331 Words
    • 2 Pages

    Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling and monitoring each incident. Identify the methods to mitigate risk and minimize exposure to threats or vulnerabilities.…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is3110 Week5 Quiz

    • 218 Words
    • 2 Pages

    5. List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.…

    • 218 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In a Toyota factory, they focused on a single mission; how to make cars better. Not only better cars, but also, better ways to make cars. The process of making the cars is very important to them. Toyota is even having a process to learn how to improve the process. So, there are three basic steps, making cars, making cars better, and training everyone how to make cars better, In addition to that, improving the process.…

    • 344 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cs120 Final Project

    • 636 Words
    • 3 Pages

    Computers have become an important part of our life. We use them in our home, workplace, and at schools. Unfortunately almost every computer user encounters some type of problem. It could be the disaster of your hard drive crashing or even a forgotten password. The increased use of computers has created a high demand for computer technicians to provide help to users, day-to-day administration, maintenance, and maintenance of computer systems and networks. This is why I have chosen Computer Information Science as my major.…

    • 636 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Multiuser operating systems allows the multiple users to access the resources of a single systems at a time or at different time. allows many users to take advantage of the computer's resources simultaneously. some permit 100's to 1000 users to take advantage of the computer's resources simultaneously. They are successful because of the powerful, efficient, stable and secure operating systems like LINUX. it has a capability of providing each user the same data ensuring total privacy from each user even while accessed by 100's of users simultaneously.…

    • 699 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    up north fishing

    • 544 Words
    • 3 Pages

    Keep up to date software and use methods when coding to prevent attacks. Test the server for vulnerabilities weekly. Configure the web services using best practices.…

    • 544 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Refining Solutions

    • 744 Words
    • 3 Pages

    What reasons might others find for opposing this solution? What modifications could you make to overcome their opposition? The biggest reason for opposition is the mindset that this group wants to come in and stop anyone from logging, drilling for oil and gas or to basically restrict activities in the area. We have to find a way to convince them that we support these activities but they must be carried out in the manner intended. Too often in these rural area, outfits try to do as little as possible and sometimes nothing to mitigate any damage to the creeks or river by…

    • 744 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

     Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling and monitoring each incident. Identify the methods to mitigate risk and minimize exposure to threats or vulnerabilities.…

    • 1066 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Training Session Handout

    • 510 Words
    • 3 Pages

    Identify countermeasures- What action needs to be taken, to ensure the problem does not happen again.…

    • 510 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Lessons of Valujet 592

    • 1044 Words
    • 5 Pages

    Coordination and process breakdowns are described in the ValuJet article. How might these system vulnerabilities have been discovered and addressed prior to serious incident or failure? What risk management approach might you take if you were responsible for the system?…

    • 1044 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    2.) Apply the problem-solving heuristic to come up with a list of suggestions for ways to improve or resolve the situation.…

    • 289 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Dana Hall

    • 525 Words
    • 3 Pages

    • Step 3: Design action plan. Develop an action plan, taking into consideration the organizational context and current understanding of the issues.…

    • 525 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lab #9

    • 650 Words
    • 3 Pages

    1. When you are notified that a user’s workstation or system is acting strangely and log files indicate system compromise, what is the first thing you should do to the workstation or system and why?…

    • 650 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Difficult Conversations

    • 459 Words
    • 2 Pages

    Preparation Tip: Before the conversation, write down the brief content of your message and devise a strategy for delivering it.…

    • 459 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Describe applications purpose and how is it used. What changes has it brought to its users? What are some likely future uses and enhancements.…

    • 799 Words
    • 3 Pages
    Good Essays