CUAWRT404 Perform Writing And Editing Tasks
Feb 25,22CUAWRT404 Perform Writing And Editing Tasks
Question:
PWW: WBR IT Scenario – Systems Integration
Gradability provides employability training to international and local students. There are three core services that Gradability provides including the Professional Year Program, Performance Career Program, and ReadyGrad courses. Gradability has a number of operational systems used to deliver its core services.
System integration is mission critical for business teams so that important information/data is transferred between systems automatically without the manual work. Although the system integration has been implemented and tested prior to the releases, issues were reported from time to time. Some issues were a result of human errors while some issues are caused by technical ones.
Background Information:
RTOManager is a student management CRM system used for managing students’ enrolment, academic record management, timesheets and compliance reporting.
Moodle system is a Learning Management System used for students for managing their assessments (e.g. online quizzes, in-class assessments, etc.)
RTOManager and Moodle systems have been integrated by Gradability. With the system integration, RTOManager transfers student enrolment data to Moodle. Similarly, Moodle system transfers grades data to RTOManager. The data transfer and migration occurs every 24 hours. The method used for the integration is via SFTP (Secure File Transfer Protocol) technology.
Issue Description:
An Academic Administrator reported an issue with grades that were not transferred to RTOManager although the students have already submitted their assessments in Moodle and they have been graded by the trainers.
The administrator expects the assessment outcomes to be transferred within 24 hours as the students have completed their assessments three days ago.
According to the initial analysis by the Help Desk Support, there are no error alerts to the system administrator. The connection and network are all working as expected.
Key Stakeholders:
Academic Administrator, Operations Manager, Senior Business Analyst, Help Desk Support, Students.
Challenge:
Do you think that the issue is caused by a user (e.g. lack of training), technical reasons (e.g. data lost), or others (e.g. incorrect business rules configured)?
Describe the detailed steps that you would take to investigate and resolve the issue.
Task:
Your manager has met with your team to discuss the issues highlighted in the above scenario.
You were commissioned to write a professional business report to investigate the issues raised, their impact on the business and suggest recommendations on possible short and long-term solutions.
- Discuss the issues raised in the scenario within your group
- Come up with an approach to investigate these in your company
- Conduct a research on possible solutions
- Suggest recommendations to your manager
Answer:
Introduction
Student ID-
Student Name-
Module Name-
Table of Contents
Discussion. 3
Approach to investigate. 3
Solutions. 4
Recommendation. 6
References. 8
Discussion
A Scholarly Superintendent noted a problem of academic results which are not transmitted to RTO Manager despite the fact that its pupils had indeed submitted one ‘s evaluations but also had them evaluated by lecturers (Jaworski et al., 2018). Per the Help Desk Team’s preliminary study, there were also neither mistake notifications for the computer technician. The linkage but also the systems too are functioning normally. Therefore, the possible reason for the error must be either a data loss or lack of training.
Data loss has been a significant matter for company’s documents implies losing to reinstate or recoup details vital to one operation. Accidental deletions mean data has been actually removed and when information becomes tainted due to a certain event. Information could become unintelligible besides beings but also applications form of malware, significant injury, or grammatical mistakes (Van der Velde & Junge, 2020). Ignoring to schedule through one organisation, on either side, basically means ignoring those regions of the organisation. Operating a large organisation necessitates specialized training.
Approach to investigate
In order to identify to exact issue and its probability there needs to be an investigation, therefore below are presented certain approaches to investigate the issue.
Recognize the information loss
Those data leak investigation suggestions start to reporting of incidents. One such process is used to determine whether or not an information violation has occurred (Ali, Jalal & Al-Obaydy, 2020). Examine the indications about a data leak to verify it.
Immediately take emergency preparedness measures
The data loss should be notified directly to those liable inside the organisation. Connectivity to left vulnerable must be confined in relation to the prevention of confidential documents.
Collect evidence
A further stage together in the ranking of data leak reply guiding principles is accumulating but also reviewing all proof associated with data violation.
Analyse
This process seeks to ascertain the facts surrounding the situation.
Take necessary measures
After this elimination phase, the organisation must resume processes. This high portion critical infrastructure to filled working order, implementing spots, altering passcodes, and so on.
Solutions
Data loss
Invariably make a backups
Prevention has been its finest form of defence. Follow a predetermined backup plan but also return up to one’s documents on a regular basis (Roberts et al., 2019). Check these same backups at regular intervals to maintain that information is adequately substantiated.
Backups should be varied
People must have three backup systems of everything which is critical. Employees must be supported up in various different locations, including the data centre but also a storage device.
Utilise anti-virus software but also information security
Electronic mail dangers including hackers, malware, and ransomware could be among the most dangerous to information. In order to help avoid fraudulent email messages from reaching the corporation, implement a comprehensive anti-virus but also surveillance alarm.
Rely upon that expert
Information is much too beneficial including being ignored. Unless RTO Manager is lost, don’t really seek to restore it using whatever screening tests. They would not like to exacerbate the problem besides attempting to resolve it on their own. Rather, collaborating with a reputable storage and disaster healing specialist to ensure the data’s safety (Barbour et al., 2020). Many companies do not necessarily lose information; however, this does not make them invincible. Except nobody desires a tragedy, RTO Manager might even now be primed. Keep in mind when planning offence has been a good defence. If RTO Manager prioritises information and data, individuals would be shielded there in event of an outage.
Lack of training
- Eschew face-to-face instruction on Saturdays and Sundays either after minutes, as well as continue training journeys toward a minimum. Consider engaging a computer-based training strategy that provides important and informative material through symptom clumps. Straightforward nanomachines configurations which create feels better to ingest include YouTube films, worksheets, graphs, and even images.
- Make the learning programmes explicitly completely obvious. Those teammates must be aware of such expectations of people throughout coaching but also what their educational accomplishments would then profit individuals through one ‘s employment. Recognize putting in place a “instructional contract” highlighting such anticipations but also having every trainee check itself as a dedication towards the education procedure.
- Undergo a comprehensive needs assessment which identifies this same viewer’s teaching style. Make utilisation of research results to help shape the training plan.
- Select technology including an easy interaction (UI). A smooth customer experience benefits all trainees, not just individuals who face challenges of innovation.
- Tactically advertising training courses to staff members but also obtaining feedback from supervisors throughout the organisation might go a far toward. Staff members must how the learning will support people so that it may indeed not fall towards the underside of one ‘s priorities list.
Recommendation
- RTO Manager should establish communications networks, including for the engineering team. Keep it short for everyone trainees to request queries but also obtain respectively material but also technical assistance by using techniques such as comment sections. In order to accommodate teaching methods, including a variety of media formats such as clips, written material, and visuals. Integrate pragmatic education into one coaching, such as research papers, situations, character, and approachable instances. Such actions encompass students through energetic problem-solving, which improves intellectual development. It also enables the learners to express emotions with one another but also along with the learning phase.
- RTO Manager should have a portable generator but rather a storage battery. Massive electricity spikes could indeed decimate personal computers, but somehow reduced electricity booms could indeed wipe away information on storage devices. Uninterrupted energy stockpiles provide safeguards all through charging but also electronics hurricanes allow information on being stored or corroborated while the strength was over. Charge distribution, which could also wipe away information but rather harm elements, should be avoided. Superfluous stationary release becomes a greater threat to tomorrow’s data storage.
- Utilise virus-detection software but also remain current. Malware isn’t quite as prevalent because as the world sees one to should become, and though people can occur or rather could indeed be fatal to information. There’s also application technology that could indeed sense portending hard disks troubles. Utilising those on a frequent basis could indeed help users prevent accidents.
References
Ali, B. H., Jalal, A. A., & Al-Obaydy, W. N. I. (2020). Data loss prevention by using MRSH-v2 algorithm. International Journal of Electrical & Computer Engineering (2088-8708), 10(4). Retrieved from: https://d1wqtxts1xzle7.cloudfront.net/64100598/32%2018663%2011jan%2015dec19%206mar19%20Y-with-cover-page-v2.pdf?Expires=1644913736&Signature=MV5w16nqdayJv3XvaJATcVnIJH9nmXyuIXDXSzg-NzcyBmkW6pdrkwwglM4483-07NDmO5Hx-pgCkJ6~y~D6KlOjeU1cjHUBn9bURdGqUZBYvC5DovDWXf-JV1XxsIiXAVFwIIKKW5R7nkBw7vDRiTE9NPsDsh~E9G7thecV131KnU2JuO4Bf8IxFg7U8UOkdvYk62MFWNbI-2Ezwctq0c4uUyvw11HghHM2A7jC-iX3lMWPlwzKqKb9FqW9xamrr91y6bvz~ZqWH6IdQLBU0g1P67I5Q1~zFg71~ucqdMcorzHwXDj193hdf-axHyFmR0B1G5fe5hA5SavuQt0tDA__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA
Barbour, J. A., O’Toole, P., Suzuki, N., &Dolwani, S. (2020). Learning endoscopic submucosal dissection in the UK: Barriers, solutions and pathways for training. Frontline Gastroenterology. DOI: 10.1136/flgastro-2020-101526
Jaworski, C., Ravichandran, S., Karpinski, A. C., & Singh, S. (2018). The effects of training satisfaction, employee benefits, and incentives on part-time employees’ commitment. International Journal of Hospitality Management, 74, 1-12. DOI: ttps://doi.org/10.1016/j.ijhm.2018.02.011
Roberts, D. J., Zygun, D. A., Ball, C. G., Kirkpatrick, A. W., Faris, P. D., James, M. T., … &Stelfox, H. T. (2019). Challenges and potential solutions to the evaluation, monitoring, and regulation of surgical innovations. BMC surgery, 19(1), 1-9. DOI: https://bmcsurg.biomedcentral.com/articles/10.1186/s12893-019-0586-5
Van der Velde, B., &Junge, C. (2020). Limiting data loss in infant EEG: putting hunches to the test. Developmental cognitive neuroscience, 45, 100809. DOI: https://doi.org/10.1016/j.dcn.2020.100809