You are on page 1of 2

Teaching and Learning Activity

Module: Technical Support System 1 (HTSS100-1)


Week number (Date): 12 (7 May 2020)
Unit covered: Unit 9

Instructions:
To enrich your learning experience at Boston even further, and to ensure that you are
exposed to a variety of resources in this module, announcements will be posted every
week containing additional materials or activities for you to work through.

It is important to note that these activities are neither compulsory nor weighted, but
that it will be to your advantage to participate. The purpose of the activities is to help
you better understand the content of your weekly unit/s of study, and it will assist in
creating insight and deeper meaning.

Activity 10 is based on Unit 9 of the prescribed courseware for this module.

Suggested solutions to this activity will be posted next Thursday

Please answer the following questions:

Question 1

You are employed as a technician and network administrator at an upcoming


educational institution. You are implementing a new system where users have to
secure their computers through the use of passwords. Previously employees used
common computers, which required no use of passwords. What recommendations will
you give to the computer users concerning their choice of passwords?

1 HTSS100-1-Jan-Jun2020-TandL-Week12-CZ-V1-29042020
Question 2

As a technician and network administrator, part of your duty is to enforce security best
practices on workstations and the entire network. Explain the tools that you would use
to ensure that security is enforced on the workstations as well as on the entire network.

Question 3

Computer users should be classified to determine the privileges they need to have to
do their jobs. Windows offer several built-in user groups as well as ones that a user
can create. Discuss the three most important built-in user groups that Windows
provide.

Question 4

Derick is the Human Resources Administrator at GH Pneumatics. The company


employs hundreds of employees at different levels. He works with very sensitive data
that should never fall into the wrong hands. He called you to set up his computer,
outline the methods that you will implement to secure his computer from unauthorised
access.

Question 5

As a network and resources administrator, it is vital for one to understand permission


levels. Explain the permission levels that can be assigned to files and folders.

2 HTSS100-1-Jan-Jun2020-TandL-Week12-CZ-V1-29042020

You might also like