Вы находитесь на странице: 1из 34

Assignment 1 , Cisco Exploration LAN Switching and Wireless

For answering this topic we have designed and developed the network in acculearns lab

Lab Setup:

Configurations used in this topology are following

PCs Configuration
Device

IP Address

Subnet Mask

Gateway

VLAN

Connected With

PC0

10.0.0.2

255.0.0.0

10.0.0.1

VLAN 10

Office 1 Switch on F0/1

PC1

20.0.0.2

255.0.0.0

20.0.0.1

VLAN 20

Office 1 Switch on F0/2

PC2

10.0.0.3

255.0.0.0

10.0.0.1

VLAN 10

Office 2 Switch on F0/1

PC3

20.0.0.3

255.0.0.0

20.0.0.1

VLAN 20

Office 2 Switch on F0/2

PC4

10.0.0.4

255.0.0.0

10.0.0.1

VLAN 10

Office 3 Switch on F0/1

PC5

20.0.0.4

255.0.0.0

20.0.0.1

VLAN 20

Office 3 Switch on F0/2

Office 1 Switch Configuration


Port

Connected To

VLAN

Link

Status

F0/1

With PC0

VLAN 10

Access

OK

F0/2

With PC1

VLAN 20

Access

OK

Gig1/1

With Router

VLAN 10,20

Trunk

OK

Gig 1/2

With Switch2

VLAN 10,20

Trunk

OK

F0/24

Witch Switch2

VLAN 10,20

Trunk

STP - Blocked

Office 2 Switch Configuration


Port

Connected To

VLAN

Link

Status

F0/1

With PC0

VLAN 10

Access

OK

F0/2

With PC1

VLAN 20

Access

OK

Gig 1/2

With Switch1

VLAN 10,20

Trunk

OK

Gig 1/1

With Switch3

VLAN 10,20

Trunk

OK

F0/24

Witch Switch1

VLAN 10,20

Trunk

STP - Blocked

F0/23

Witch Switch3

VLAN 10,20

Trunk

STP - Blocked

Office 3 Switch Configuration


Port

Connected To

VLAN

Link

Status

F0/1

With PC0

VLAN 10

Access

OK

F0/2

With PC1

VLAN 20

Access

OK

Gig 1/1

With Switch2

VLAN 10,20

Trunk

OK

F0/24

Witch Switch1

VLAN 10,20

Trunk

STP - Blocked

Router Configuration
Port

Connected To

VLAN

Link

Status

Fa0/0

with Office 1 Switch Gig 1/2

VLAN 10, 20

Trunk

Ok

VLAN Configuration
VLAN Number

VLAN Name

Gateway IP

PCs

10

Sales

10.0.0.1

PC0,PC2,PC4

20

Management

20.0.0.1

PC1,PC3,PC5

Configure VTP
VLAN Trunk Protocol (VTP) is a Cisco proprietary protocol used to share VLAN configuration across
the network. Cisco created this protocol to share and synchronize their VLAN information
throughout the network. Main goal of VTP is to manage all configured VLANs across the network.
In our network we only have three switches. We can easily add or remove VLAN manually on all
three switches. However this process could be more tedious and difficult if we have 50 switches. In a
large network, we might make a mistake in VLAN configuration. We might forget to add VLAN on
one of the switch, or we may assign wrong VLAN number. Vice versa we may forget to remove VLAN
on one of the switch, while removing VLANs.
VTP is a life saver protocol in this situation. With VTP we can add or remove VLANs on one switch
and this switch will propagate VLAN information to all other switches in network.

VTP Messages
VTP share VLANs information via VTP messages. VTP messages can only be propagate through the
trunk connections. So we need to set up trunk connection between switches. VTP messages are
propagated as layer 2 multicast frames.

VTP Domain

VTP domain is a group of switches that share same VLAN information. A switch can have a single
domain. VTP messages include domain name. Switch only update VLAN information if it receive VTP
message from same domain.

VTP Mode
VTP can be configured in three different modes.
Server
Transparent
Student
VTP Server Mode
VTP Server can add, modify, and delete VLANs. It will propagate a VTP message containing all the
changes from all of its trunk ports. If server receives a VTP message, it will incorporate the change
and forward the message from all remaining trunk ports.
VTP Transparent Mode
VTP Transparent switch can also make change in VLANs but it will not propagate these changes to
other switches. If transparent switch receives a VTP message, it will not incorporate the change and
forward the message as it receives, from all remaining trunk ports.
VTP Student Mode
VTP student switch cannot change the VLAN configurations itself. It can only update its VLAN
configuration through the VTP messages that it receive from VTP server. When it receives a VTP
message, it incorporates with the change and then forwards it from remaining trunk ports.
Configure VTP Server
To configure Office 1 Switch as VTP Server. we have ssh connection through putty Office 1 Switch.

By default all switches work as VTP server so we only need few commands to configure it. In
following commands we will
Set hostname to S1
Set domain name to acculearn
Set password to acculearn. (Password is case sensitive)

Switch>enable
Switch#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#hostname S1

S1(config)#vtp mode server


Device mode already VTP SERVER.
S1(config)#vtp domain acculearn
Changing VTP domain name from NULL to acculearn
S1(config)#vtp password acculearn
Setting device VLAN database password to acculearn
Configure VTP Student
We have configured Office 2 Switch and Office 3 Switch as VTP student switch. Access CLI prompts
of Office 2 Switch and execute following commands

Switch>enable
Switch#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#hostname S2
S2(config)#vtp mode student
Setting device to VTP STUDENT mode.
S2(config)#vtp domain acculearn
Changing VTP domain name from NULL to acculearn
S2(config)#vtp password acculearn
Setting device VLAN database password to acculearn
S2(config)#
Now access CLI prompts of Office 3 Switch and enter following commands
Switch>enable
Switch#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#hostname S3
S3(config)#vtp mode student
Setting device to VTP STUDENT mode.
S3(config)#vtp domain acculearn
Changing VTP domain name from NULL to acculearn
S3(config)#vtp password acculearn

Setting device VLAN database password to acculearn


S3(config)#
We have configured VTP server and VTP student. At this moment VTP student will not receive VTP
messages from server. We need to configure DTP between switches.
Configure DTP
Dynamic Trunk Protocol (DTP) is again a Cisco proprietary protocol that is used on trunk connections
to setup trunk dynamically. DTP supports five trunking modes.
DTP Mode ON
In ON mode interface is set to trunk, regardless remote end supports trunking or not. On mode
cause interface to generate DTP messages and tag frames based on trunk type.
DTP Mode Desirable
In Desirable mode interface will generate the DTP messages and send them to other end. Interface
will work as access link until it get replies from remote end. If reply messages indicate that remote
device is trunking capable, DTP will change connection link in trunk from access link. If other end
does not respond to DTP message, the interface will work as access link connection.
DTP Mode Auto
In auto mode interface works as access link and passively listen for DTP messages. Interface will
change connection link to trunk, if it receives a DTP message from remote end.
DTP Mode No-Negotiate
In No-Negotiate mode interface is set as trunk connection. Interface will tag frames but it will not
generate DTP messages. DTP is a Cisco's proprietary protocol, thus a non Cisco device will not
understand it. This mode is used to trunk connection between Cisco device and a non Cisco device.
DTP Mode OFF
In off mode interface is configured as access-link. No DTP message will be generated nor frames will
be tagged.
In our topology we need to configure trunk on following interfaces
Switch

Interfaces

Office 1

Gig1/1, Gig1/2, F0/24

Office 2

Gig1/1, Gig1/2, F0/23, F0/24

Office 3

Gig1/1, Gig1/2

By default all interface on switch starts as access link. switchport mode trunk command is used to
change connection link in trunk. Run this command from interface mode. In next section we will
change all necessary interfaces [given in above table] connection link in trunk.
Office 1 Switch
S1(config)#interface fastEthernet 0/24
S1(config-if)#switchport mode trunk
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/24,
changed state to down
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/24,
changed state to up
S1(config-if)#exit
S1(config)#interface gigabitEthernet 1/1
S1(config-if)#switchport mode trunk
S1(config-if)#exit
S1(config)#interface gigabitEthernet 1/2
S1(config-if)#switchport mode trunk
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet1/2,
changed state to down
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet1/2,
changed state to up
S1(config-if)#exit
S1(config)#
Office 2 Switch
S2(config)#interface gigabitEthernet 1/1
S2(config-if)#switchport mode trunk
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet1/1,
changed state to down
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet1/1,
changed state to up
S2(config-if)#exit
S2(config)#interface gigabitEthernet 1/2
S2(config-if)#switchport mode trunk

S2(config-if)#exit
S2(config)#interface fastEthernet 0/23
S2(config-if)#switchport mode trunk
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/23,
changed state to down
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/23,
changed state to up
S2(config-if)#exit
S2(config)#interface fastEthernet 0/24
S2(config-if)#switchport mode trunk
S2(config-if)#exit
Office 3 Switch
S3(config)#interface fastEthernet 0/24
S3(config-if)#switchport mode trunk
S3(config-if)#exit
S3(config)#interface gigabitEthernet 1/1
S3(config-if)#switchport mode trunk
S3(config-if)#exit
So far we have configured VTP server and VTP students. We have also changed necessary links in
trunk. Now we will configure VLANs on VTP server and that will automatically propagate VLANs in
network.
Configure VLAN
Create VLAN
vlan vlan number command is used to create the VLAN. VLANs are created on VTP Server. In our
network, Office 1 Switch is working as VTP Server; thus we will create VLANs on it.
Office 1 Switch
S1(config)#vlan 10
S1(config-vlan)#exit
S1(config)#vlan 20
S1(config-vlan)#exit
S1(config)#
How to assign VLAN Membership

VLAN can be assigned statically or dynamically. In our course we will use static method; therefore we
will also use static method to assign VLAN membership. switchport access vlan [vlan
number] command is used to assign VLAN to the interface. Following commands will assign VLANs to
the interfaces.
Office 1 Switch
S1(config)#interface fastEthernet 0/1
S1(config-if)#switchport access vlan 10
S1(config-if)#interface fastEthernet 0/2
S1(config-if)#switchport access vlan 20
Office 2 Switch
S2(config)#interface fastEthernet 0/1
S2(config-if)#switchport access vlan 10
S2(config-if)#interface fastEthernet 0/2
S2(config-if)#switchport access vlan 20
Office 3 Switch
S3(config)#interface fastEthernet 0/1
S3(config-if)#switchport access vlan 10
S3(config-if)#interface fastEthernet 0/2
S3(config-if)#switchport access vlan 20
Here we have successfully assigned VLAN membership. Now at this point is to test our configuration.
To test this configuration, we will use pingcommand. ping command is used to test connectivity
between two devices. As per our configuration, devices from same VLAN can communicate. Devices
from different VLANs must not be able to communicate with each other without router.
Test VLAN configuration
We have two VLAN configurations VLAN 10 and VLAN 20. We have to test VLAN 10 first. In VLAN 10
we have three PCs with IP addresses 10.0.0.2, 10.0.0.3 and 10.0.0.4. These PCs must be able to
communicate with each other's. At this point PCs from VLAN 10 should not be allowed to access PCs
from VLAN 20. VLAN 20 also has three PCs 20.0.0.2, 20.0.0.3 and 20.0.0.4.

We have successfully implemented VLAN 10 now test VLAN 20.


Same as VLAN 10, PCs from VLAN 20 must be able to communicate with other PCs of same VLAN
while they should not be able to access VLAN 10.

Configure Router on Stick


Typically routers are configured to receive data on one physical interface and forward that data from
another physical interface based on its configuration. Each VLAN has a layer 3 address that should be
configured as default gateway address on all its devices. In our scenario we reserved IP address
10.0.0.1 for VLAN 10 and 20.0.0.1 for VLAN 20.

With default configuration we need two physical interfaces on router to make this intra VLAN
communication. Due to price of router, its not a cost effective solution to use a physical interface of
router for each VLAN. Usually a router has one or two Ethernet interface. For example if we have 50
VLANs, we would need nearly 25 routers in order to make intra VLANs communications. To deal with
situation we use Router on Stick.
Router on Stick is router that supports trunk connection and has an ability to switch frames between
the VLANs on this trunk connection. On this router, single physical interface is sufficient to make
communication between our both VLANs.
Access command prompt of Router
To configure Router we have access the router through aux port and gained access to CLI mode.

Run following commands in same sequence to configure Router

Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface fastEthernet 0/0
Router(config-if)#no ip address
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#interface fastEthernet 0/0.10
Router(config-subif)#encapsulation dot1Q 10
Router(config-subif)#ip address 10.0.0.1 255.0.0.0
Router(config-subif)#exit
Router(config)#interface fastEthernet 0/0.20
Router(config-subif)#encapsulation dot1Q 20
Router(config-subif)#ip address 20.0.0.1 255.0.0.0
Router(config-subif)#exit
In above configuration we broke up single physical interface [FastEthernet 0/0] into two logical
interfaces, known as sub-interfaces. Router supports up to 1000 interfaces including both physical
and logical.
By default interface link works as access link. We need to change it into trunk link. encapsulation
commands specify the trunk type and associate VLAN with sub-interface.
In next step we assigned IP address to our sub-interface.

That's all configuration we need to switch VLANs. Now we can test different VLAN communications.
To test intra VLANs communication open command prompt of PC and ping the PC of other VLAN.

PC [10.0.0.3] from VLAN 10 can now access PC [20.0.0.2] from VLAN 20.
Spanning Tree Protocol (STP)
STP is a layer 2 protocol, used for removing loops. For backup purpose we typically create backup
links for important resources. In our scenario, all offices have backup links that create loops in
topology. STP automatically removes layer 2 loops. STP multicasts frame that contain information
about switch interfaces. These frames are called BPDU (Bridge Protocol Data Units). Switch use
BPDUs to learn network topology. If it found any loop, it will automatically remove that. To remove
loop, STP disables port or ports that are causing it.

Assignment 2. Networking Principles

To describe Networking Principles we have to understand following,

Physical/ virtual Network Topologies


Describe OSI layer model
Describe Networking Essentials

A Network Topology is the arrangement with which computer systems or network devices are
connected to each other. Topologies may define both physical and logical aspect of the network.
Both logical and physical topologies could be same or different in a same network.
They are just different ways of representing a network architecture. Physical topologies are how the
wires are interconnected, while logical topology is how the network behaves and interoperates.
Here we will discuss the common network topologies
Point-to-Point
Point-to-point networks contains exactly two hosts such as computer, switches or routers, servers
connected back to back using a single piece of cable. Often, the receiving end of one host is
connected to sending end of the other and vice-versa.

If the hosts are connected point-to-point logically, then may have multiple intermediate devices. But
the end hosts are unaware of underlying network and see each other as if they are connected
directly.
Star Topology
All hosts in Star topology are connected to a central device, known as hub device, using a point-topoint connection. That is, there exists a point to point connection between hosts and hub. The hub
device can be any of the following:
Layer-1 device such as hub or repeater
Layer-2 device such as switch or bridge
Layer-3 device such as router or gateway

As in Bus topology, hub acts as single point of failure. If hub fails, connectivity of all hosts to all other
hosts fails. Every communication between hosts, takes place through only the hub. Star topology is
not expensive as to connect one more host, only one cable is required and configuration is simple.
Tree Topology
Also known as Hierarchical Topology, this is the most common form of network topology in use
presently. This topology imitates as extended Star topology and inherits properties of bus topology.
This topology divides the network in to multiple levels/layers of network. Mainly in LANs, a network
is bifurcated into three types of network devices. The lowermost is access-layer where computers
are attached. The middle layer is known as distribution layer, which works as mediator between
upper layer and lower layer. The highest layer is known as core layer, and is central point of the
network, i.e. root of the tree from which all nodes fork.

All neighbouring hosts have point-to-point connection between them. Similar to the Bus topology, if
the root goes down, then the entire network suffers even. Though it is not the single point of failure.
Every connection serves as point of failure, failing of which divides the network into unreachable
segment.
Daisy Chain
This topology connects all the hosts in a linear fashion. Similar to Ring topology, all hosts are
connected to two hosts only, except the end hosts. Means, if the end hosts in daisy chain are
connected then it represents Ring topology.

Each link in daisy chain topology represents single point of failure. Every link failure splits the
network into two segments. Every intermediate host works as relay for its immediate hosts.

OSI Layer Model


Network models help us to understand various functions of the components that provide us the
networking service. The Open System Interconnection Reference Model is one of such models. OSI
model describes how information from a software application in one computer moves through a
network medium to a software application in another computer. The OSI reference model is a
conceptual model composed of seven layers, each specifying particular network functions.

Layer 7 Application Layer: The application layer is the OSI layer closest to the end student, which
means that both the OSI application layer and the student interact directly with the software
application. This layer interacts with software applications that implement a communicating
component. Such application programs fall outside the scope of the OSI model. Application layer
functions typically include identifying communication partners, determining resource availability,
and synchronizing communication. Examples of application layer implementations include Telnet,
Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), NFS and Simple Mail Transfer
Protocol (SMTP).

Layer 6 Presentation Layer: The presentation layer provides a variety of coding and conversion
functions that are applied to application layer data. These functions ensure that information sent
from the application layer of one system would be readable by the application layer of another
system. Some examples of presentation layer coding and conversion schemes include common data
representation formats, conversion of character representation formats, common data compression
schemes, and common data encryption schemes, for example, eXternal Data Representation (XDR)
used by Network File System (NFS).
Layer 5 Session Layer: The session layer establishes, manages, and terminates communication
sessions. Communication sessions consist of service requests and service responses that occur
between applications located in different network devices. These requests and responses are

coordinated by protocols implemented at the session layer. Examples of session layer protocols
include NetBIOS, PPTP, RPC and SSH etc.

Layer 4 Transport Layer: The transport layer accepts data from the session layer and segments the
data for transport across the network. Generally, the transport layer is responsible for making sure
that the data is delivered error-free and in the proper sequence. Flow control generally occurs at the
transport layer. Transmission Control Protocol (TCP) and Student Datagram Protocol (UDP) are
popular transport layer protocols.

Layer 3 Network Layer: The network layer defines the network address, which differs from the
MAC address. Some network layer implementations, such as the Internet Protocol (IP), define
network addresses in a way that route selection can be determined systematically by comparing the
source network address with the destination network address and applying the subnet mask.
Because this layer defines the logical network layout, routers can use this layer to determine how to
forward packets. Because of this, much of the design and configuration work for inter-networks
happens at Layer 3, the network layer. The Internet Protocol (IP) and related protocols like ICMP,
BGP etc are commonly used layer 3 protocols.

Layer 2 Data link Layer: The data link layer provides reliable transit of data across a physical
network link. Different data link layer specifications define different network and protocol
characteristics, including physical addressing, network topology, error notification, sequencing of
frames, and flow control. Physical addressing (as opposed to network addressing) defines how
devices are addressed at the data link layer. Asynchronous Transfer Mode (ATM) and Point-to-Point
Protocol (PPP) are common examples of layer 2 protocols.

Layer1 Physical Layer: The physical layer defines the electrical, mechanical, procedural, and
functional specifications for activating, maintaining, and deactivating the physical link between
communicating network systems. Physical layer specifications define characteristics such as voltage
levels, timing of voltage changes, physical data rates, maximum transmission distances, and physical
connectors. Popular physical layer protocols include RS232, X.21, Firewire and SONET.

Four layered TCI/IP OSI model

Assignment 3: System Architecture

The term system architecture is used to describe the overall design and structure of a
computer network or system. As information technology has expanded to include a wide
range of physical devices, a method is required to organize and connect these items together
in a cohesive manner. The term is also used to describe complex computer software tools that
include multiple modules.

There are four main components to any system architecture: processing power, storage,
connectivity, and student experience. The complexity of the system varies widely and is
dependent upon student needs, business requirements, funding, and resource availability. It is
important to note that system architecture must be flexible and able to meet changing needs
quickly. A structure that is too rigid will not be able to accommodate new software or
hardware.
Processing power is based on the computer or server. This hardware is akin to the brain of the
system. Purchasing and installing the correct allocation of processors to the system must be
based on the software specifications, number of concurrent students, strength of the
connection, and applications. When designing a system, scalability is critical. The system
architecture must allow additional processors to be added without any interruption to the
current structure.
There are four main components to any system architecture: processing power, storage,
connectivity, and student experience.

Storage space is based on the number and capacity of the hard drives and related devices built
into the system. Cost is a determining factor for this type of equipment, as the cost is
constantly decreasing as the capacity increases. This is due to ongoing improvements in the
production process. However, from an architecture perspective, this adds another element to
the process. As the capacity increases, the overall physical shape can change, making
equipment obsolete.
Managing network traffic and connectivity is an important part of the system design. Much like
roads in everyday life, the performance of the system is dependent upon correctly sizing and
maintaining the connectivity between all aspects of the system. Upgrading network cable, switches,
routers, and other equipment is expensive and time consuming, but has a huge impact on system
performance.
The student experience is based on a combination of system architecture and performance. Business
students typically have minimal understanding or interest in all the aspects of the system that can
positively or negatively impact his or her individual computer. A well-designed support system is
responsive to students need and can support the operation in the long run. The responsibility for the
overall architecture and support typically falls to the technical operations department.

Assignment 4: Health and Safety in ICT


During apprenticeship I havent noticed much Health and safety issue at workplace environment.
However, there are various health issues associated with the regular use of computers such as
stress, eyestrain and injuries to the wrists, neck and back.
Symptoms:
Burning or itching eyes
Headache
Nausea
Fatigue
Solutions:
Use monitors that dont flicker
Windows should be covered to avoid glare
Use appropriate lights that disperse evenly
Use screen filter
Keep eyes at least 18 inches away from screen
Regularly look away from screen and focus on something else.
Symptoms & Solutions
Back pain & repetitive strain injury
Many computer students suffer back issues, this is often due to a poor posture or awkward position.
To avoid back-pain
Use fully adjustable chair
5 wheels chair
A foot rest
Adjustable monitor arm

Take regular breaks


Repetitive strain injury is damage to the fingers, wrist and other parts of the body due to repeated
movements over a long period of time.
Aching pain in arms/ wrists even after rest, weakness, swelling, tenderness, numbness and burning
sensation in the shoulder and neck.
Safety issues
The workplace can be dangerous place. Some precautions which can be taken to reduce the risk of
accidents are:
No wires around to be tripped over
No electrical sockets overloaded
Electrical equipment should be safety tested at least once a year
Bags and obstacles should be out of the way
Staff should follow the safety regulations
Fire extinguishers should be available to everyone
Food/drink should not be near computers
Fire exits should be clearly marked.
Employer Obligations
Laws have been passed to ensure that employers provide safe working environment for anyone who
works with computers. This is called Health and Safety at work act 1974.
This law states that an employer must
Provide tilt able screen
Provide anti-glare screen filters
Provide adjustable chairs
Provide foot support
Make sure lightning is suitable
Make sure employees have sufficient breaks
Assignment 5: Develop Own Effectiveness And Professionalism

1. Work as a member of a team to achieve defined goals and implement agreed plans
1.1 Effectively plan and manager your own time
My plan for a day working at Acculearn normally consists of the same usual activities which are
assigned to me to complete. So I get into work for half 8 so I can answer the phone if any students
have some early morning problems. Once both of my supervisors are in, I will try and complete any
emails that I have flagged in IT helpdesk.
Whenever we have any activity with new starters or leavers, it is up to me to make sure that
everything is sorted according to a checklist that I have created with my supervisor. I am also in
control of sorting out new computers or laptops when they arrive, by installing our Acculearn
image upon them and installing all of the necessary software. Any events such as meetings or tasks

that I need to perform are recorded and placed within my calendar, to give me a little reminder of
what I need to do on certain days.

1.2 Recognise and respect diversity, individual differences and perspectives


Identifying the different perspectives of students is one of the main areas that we try and focus on
here in IT. Where one student may prefer to have their desk and computer setup in one way,
someone else will always differ. Making sure these specifications are met allows our students to
work more efficiently in their area of expertise.
1.3 Accept and provide feedback in a constructive and considerate manner
This is covered throughout my appraisal, where I and my supervisor discuss the areas of my work,
the positives and negatives from my performance and how I can improve in the future.
1.4 Understand the responsibilities, interests and concerns of colleagues
This is pointed out during my appraisal whether it is the quality of service I provide, my
communication with students when they have concerns or my team working abilities, all this show is
that I understand the responsibilities and interests of my fellow colleagues.
1.5 Identify and reduce obstacles of effective teamwork
This is covered in question 3 of my appraisal, where we discuss my communication techniques, such
as talking problems through with students, discussing problems with my supervisors and presenting
solutions in a way that everybody can understand.
2. Understand what is meant by professional practice
2.1 Describe the implications and applicability of for IT professionals of The Data protection Act
and Computer Misuse Act
Data Protection Act 1998
The Data Protection 1998 came into effect on the 1st March 2000, with the purpose of the act being
to protect the rights and privacy on individuals, and to ensure that data about them are not
processed without their knowledge and are processed with their consent wherever possible. The
main principles of the Data Protection Act 1998 are as followed:-

Personal data shall be obtained for one or more specified and lawful purposes and must not be
processed in any manner that is incompatible with that purpose or purposes.
Personal data shall be processed fairly and lawfully and not processed unless certain conditions are
met and in the case of sensitive personal data further conditions are met.
Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes
for which they are processed.
Personal data shall be accurate and, where necessary, kept up to date.
Personal data held for any purpose or purposes shall not be kept for longer than is necessary for that
purpose or those purposes.
Personal data shall be processed in accordance with the rights of data subjects under the 1998 Act.
Appropriate technical and organisational measures shall be taken against unauthorised or unlawful
processing of personal data and against accidental loss or destruction of, or damage to, personal
data.
Personal data shall not be transferred to a country outside the European Economic Area, unless that
country or territory ensures an adequate level of protection for the rights and freedoms of data
subjects in relation to the processing of personal data.
Obviously working for Training they deal with confidential information all the time, so it is up to IT to
make sure that none of this information falls into the wrong hands. We do daily backups of each
server onto backup tapes, that are then stored within a secure safe. We also have to get verification
from the student and their superior before we allow someone to have access to their emails or
h:/drive.
Computer Misuse Act
The implications of the computer misuse act are that any unauthorised access to someones
computer or the data on that computer is deemed illegal. Also the making and supplying of software
that can facilitate these activities is within breach of the act. The act is split into three sections
making the following acts illegal.
Unauthorized access to computer material
Unauthorized access to computer systems with intent to commit another offense
Unauthorized modification of computer material
The first section of the act forbids a person to use someone elses identification to access a
computer, run a program, or obtain any data. The act also outlaws any attempts that are made to
change, delete or move a program and also any attempts to gain someones password.
The second point is more associated with gaining access to a computer system in order to commit or
facilitate a crime. An individual cant use someone elses system to send material that might be
offensive or to start worms or viruses. He also cant give someone his identification so that he can
use a system for this purpose.
When it comes to unauthorized modification on a computer system, an individual cannot delete,
change or corrupt data. So if someone places a virus onto someone elses machine, he would be
violating the act. Usually committing unauthorized access only is thought a crime punishable by fine.

Access with intent and unauthorized modification however is considered more severe and can be
punished by heavy fines and/or jail time.
So when a new starter arrives at Acculearn, they firstly are shown the IT Communication Policy,
which within it states that no software or documentation can be brought over from a previous
company. This is to reduce the risk of any malicious software making its way onto the system.
We also must have verification from the student and their superior, when someone asks for access
to someone else emails or student area. Once we have that authorisation, we will then give the
student access to that certain item, explaining the rights and responsibilities they now have.
2.2 Identify the role of professional bodies for IT, and the benefits of membership to individuals
and organisations
FAST (Federation against Software Theft)
FAST aims to reduce, restrict and or lessen the incidence of unauthorised dealings in computer
software. They handle this with the management of legitimate software and by protecting
publishers intellectual property rights.
The major benefits of associating yourself with FAST are the following bullet points:Business Development and Networking Meet potential and existing partners and customers at
FAST events, sharing your knowledge and insight for the industry.
A voice for the Industry With FAST being a trade association, they look to ensure that their
members voice is heard at a government level and that the economic contribution of the software
industry is valued and supported.
Visibility and Branding Allowing you to raise the profile of your company and the products it
produces and provides via FAST editorial and marketing opportunities.
Intellectual Property Protection Allows you access to an invaluable network of support when your
IP comes under attack from any source.
BCS (British Computer Society)
The British Computer Society is a chartered institute for IT champions, the global IT profession and
the interests of individuals engaged within the profession as well. The major benefits of subscribing
to their services are
There will provide the tools to help develop your career, with methods such as mentoring,
discounted training opportunities, access to Best Practice Portal/Corporate IT Forum.
As a member you will get the opportunity to regularly network with people and discuss various
topics relevant to different areas of IT. Many of these opportunities will take place at official BCS
facilities. You will also be able to network remotely via social media and the BCS Member network.
There is further access to online libraries, such as ITNOW and discount also available for IT eBooks
and IT magazines as well.
2.3 Describe quality management systems and standards for systems development
Quality Management Systems

A quality management system is all about the structure, procedures, processes and resources
needed to implement quality management. Over the years the way in which quality management is
accessed has changed, meaning new methods have come in to help improve the quality of service
that a company will provide. There several elements that make up a QMS and they include:Organisational Structure
Data Management
Customer Satisfaction
Continuous Improvement
Product Quality
Transparency and independent audit
Standards for System Development
The system development life cycle is the process for creating and altering information systems, and
the models and methodologies that people use to develop them. The methodology behind this
system forms the framework for planning and controlling the creation, testing and delivery of an
information system.
The systems development life-cycle concept acts as the foundation for multiple different
development and delivery methodologies, such as hardware and software. But the standard setup
for any system development life cycle normally includes the following basic processes:Planning
Analysis
Design
Implementation
Maintenance
Within each of these processes there are various sub-processes as well which help complete each
stage of the development cycle. Processes such as testing would take place during the design stage
or training and transition processes for the staff and colleagues would take place during the
implementation process.
3. Understand the ethical and legislative environment relating to IT activities
3.1 Identify the types of conflicts of interest which can arise for IT professionals
Working for the IT helpdesk here at Acculearn Training we regularly come across problems which
can cause some kind of commotion which results in different types of conflict. Whenever someone
contacts IT helpdesk with a question; whether it be by email or phone, they are taking time out of
their day where they could be getting on with work for a student.
So it is imperative that we get them back up and running as quickly as we possibly can. Sometimes
however the quick solution isnt achievable due to the severity of the problem or because of reasons
outside of our control. So the longer the problem goes unsolved, the more conflict can arise
between us and the student.

So in this case above the conflict of interest revolves around the basis of the student trying to get
their work done, but their computer then prevents them from carrying out the task meaning that we
then have to provide a helping hand to dismiss the conflict between the two.
3.2 Describe the impact on an organisation of legislation covering:
Processing of financial transactions
This is all covered within the Training Regulations Authority, where finance departments are has to
abide by the account rules, which are the following:The main purpose of the account rules within the Training Regulations Authority is to keep our
students money safe. Our finance department must comply with the below principles, which are the
following:Keep other peoples money separate from money belonging to you or your firm.
Keep other peoples money safely in a bank or building society account identifiable as a student
account (Except when the rules specifically provide otherwise)
Use each students money for that students matter only.
Use money held a trustee of a trust for the purposes of that trust only.
Establish and maintain proper accounting systems, and proper internal controls over those systems,
to ensure compliance with the rules.
Keep proper accounting records to show accurately the position with the regard to the money held
for each student and trust
Account for interest on other peoples money in accordance with the rules.
Co-operate with the SRA in checking compliance with the rules and deliver annual accountants
reports as required by the rules.
When it comes to processing a bill for a student here at Acculearn we will use our case management
software, Student Management System to process and produce the bill. But before we can go
through the process of producing the bill we need to have some form of identification from the
student. This is called anti money laundering (AML) which is a set of rules and regulations that stops
the practice of generating income from illegal actions.
So the way we combat this is by asking for 2 forms of identification from the student, when they are
first added to the system. If we dont have this completed by the time we open a matter on the
student, then we wont accept money generated on the student from bills or time recording.
We also use online banking via Barclays, which always needs authorisation for any payments coming
in or going out. The authorisers in question are people who have worked at Acculearn for more than
6 months. They are provided with tokens which they have to use every time they log into the online
banking.
Once that they are in they will have a list of payments that they will need to authorise, along with
the payment sheets that are provided for them. The information on these sheets should match the
details on the screen. If it does then the authoriser can sign the payment off and hand the sheet
back to the finance department authorised.

Assignment 6: Customer Care in ICT


Customer care is a crucial element of business success. Every time you have contact with your
customer you have an opportunity to improve your reputation with them and increase the likelihood
of further sales.
From your telephone manner to the efficiency of your order fulfilment system almost every aspect
of your business affects the way your customer view your business. There are also specific
programme you can put in place to increase your level of customer care.
Customer care involves putting systems in place to maximize your customers' satisfaction with your
business. It should be a prime consideration for every business - your sales and profitability depends
on keeping your customers happy.
Customer care is more directly important in some roles than others. For receptionists, sales staff and
other employees in customer-facing roles, customer care should be a core element of their job
description and training, and a core criterion when you're recruiting.
But don't neglect the importance of customer care in other areas of your business. For instance,
your warehousing and dispatch departments may have minimal contact with your customers - but
their performance when fulfilling orders has a major impact on customers' satisfaction with your
business.
A huge range of factors can contribute to customer satisfaction, but your customers - both
consumers and other businesses - are likely to take into account:

how well your product or service matches customer needs

The value for money you offer

Your efficiency and reliability in fulfilling orders

The professionalism, friendliness and expertise of your employees

How well you keep your customers informed

The after-sales service you provide

Verbal attend
The basis of communication is the interaction between people. Verbal communication is one way
for people to communicate face-to-face. Some of the key components of verbal communication are
sound, words, speaking, and language.
Intonation: intonation is not always used correctly. For instance, the fact that simultaneous
interpreters do not know how the speaker is going to proceed in his or her speech may lead the
interpreters intonation to indicate their state of expectation. In that case, the voice tends to go up
at the end of a sentence. In many languages, a rising intonation is a sign of surprise or a question,
but when being used systematically by the interpreter it becomes very difficult for the audience to
listen and understand where sentences begin and end, or to distinguish what is affirmative and what
is interrogative.
Tone: The tone of voice is a means by which the speaker implies his or her attitude to the message.

It is also a means by which he seeks a reaction from the hearer. In a political debate, for instance,
the tone of voice is likely to be rousing, whereas on television the daily news is communicated in a
more factual tone. Other examples of tone of voice are: aggressive, critical, nervous, disappointed,
monotonous, friendly, enthusiastic, vivid, persuasive, etc.
Feedback: Your audience will provide you with feedback, verbal and non-verbal reactions to your
communicated message. Feedback, as it is the only thing that allows you to be confident that your
audience has understood your message. If you find that there has been a misunderstanding, at least
you have the opportunity to send the message a second time.

Non-verbal techniques

Smiling on phone: Smile while you're talking this has a proven positive effect on the conversation.
Have a pen and paper handy, or be ready at the keyboard to write down or type any addresses,
phone numbers, dates, or other important facts that might be discussed during the call.
Mute or turn off the television before attempting to use the phone
Always say HELLO do not say anything else
Use an approved company greeting when answering a business call
Allow the line to ring at least five before hanging up
If possible ask anyone you call if it is a good time to be calling
Be sure to state the purpose of the call early in the conversation, and thank the other person before
you complete the call
Be patience and listen the caller carefully

Tidy language: Consider how your perceptions of people are affected by the way they sit, walk, stand
up, or hold their head. The way you move and carry you communicates a
Wealth of information to the world. This type of nonverbal communication includes your posture,
bearing, stance, and subtle movements.
Be Open and Confident: When it comes to making the first impression, body language as well as
appearance speaks much louder than words.
Use your body language to project appropriate confidence and self-assurance. Stand tall, smile (of
course), make eye contact, greet with a firm handshake. All of this will help you project confidence
and encourage both you and the other person to feel better at ease.

Interpersonal Communication Technique

Attentive listening: Means thinking and acting in ways that connect you with the speaker. While
active listing usually happens naturally when we are very interested in what someone is saying. We
can also choose to listening activity whenever we want to maximize the quality of our listening both
in terms of the effect it has on us and the effect it has on those we are speaking to. By contrast,
when people "multi-task" while someone speaks, they rarely listen effectively.
Difference between hearing and listening: Listening and hearing may be both sensed through our
ears but beyond that listening is very different to hearing. Hearing is just the perception that there
are several sounds going through your ear while listening is parsing every part of the sound and
understanding what it is meant. Therefore, listening begets understanding while hearing does not.
Aside from this, listening requires attentiveness and concentration which requires your brain to
work.
Positive and negative language: Positive body language is when a person is showing they are happy
or comfortable e.g. leaning towards the person they are talking to/with or simply smiling
Negative body language is showing the person is uncomfortable or unhappy e.g. crossed arms,
frowning, looking around the room aimlessly (bored).

Negative phrasing and language often have the following characteristics:


Tells the recipient what cannot be done.
Has a subtle tone of blame.
Includes words like can't, won't, unable to, that tell the recipient what the sending agency cannot
do.
Does not stress positive actions that would be appropriate, or positive consequences.
Positive phrasing and language have the following qualities:
Tells the recipient what can be done
Suggests alternatives and choices available to the recipient
Sounds helpful and encouraging rather than bureaucratic
Stresses positive actions and positive consequences that can be anticipated

Active listening:
Active listening is a communication technique. Active listening requires the listener to understand,
interpret, and evaluate what they hear. The ability to listen actively can improve personal
relationships through reducing conflicts, strengthening cooperation, and fostering understanding.
When you do active listening, you're agreeing to focus on a common goal: to improve your ability to
deal with the problems in your relationship.

Active listening is very different from the way we usually deal with arguments. It will be difficult to
make this kind of change when both of you feel very upset. Don't get discouraged if it doesn't work
right away.

Summarising: A summary is an overview of a text. The main idea is given, but details, examples and
formalities are left out. Used with longer texts, the main aim of summarizing is to reduce or
condense a text to its most important ideas. Summarizing is a useful skill for making notes from
readings and in lectures, writing an abstract/synopsis and incorporating material in assignments.
Paraphrasing: A paraphrase is a passage borrowed from a source and rewritten in your own words. A
paraphrase should be true to the original authors idea, but is rewritten in your own words and
sentence structure. Since you are using someone elses ideas and expressing them in your own
words, it is very important to give credit to the source of the idea.

Body language: Body language is a form of non-verbal communication, which consists of body
posture, gestures, facial expressions, and eye movements. Humans send and interpret such signals
subconsciously. Body language is one our most subtle, yet important modes of communication.
Understanding body language, or non-verbal communication, enables us to positively develop our
communication style, and improve our relationships with people around us.

Listening barriers: Listening barriers can prevent effective listening if they arent understood and
managed.

Background noise: Background noise is any sound element that tends to distract or in some manner
interfere with the ability of the individual to hear or be heard. There are many different types of
background noises, ranging from those that are almost undetectable to others that are extremely
irritating. Fortunately, there are often ways to minimize the intrusion of this secondary noise and
overcome the irritation. When you talk to the customer make sure you are not in noisy place and
make sure you have no background noise dont listen music, talk in mobile phone and talking with
friend. If you are doing these things you maybe lose your job.

Distractions: Holding ones attention today is difficult enough without distractions. We need to
minimize distractions. Some of the standard distractions are:

Noise: Many times it is difficult to have meaningful conversations due to a noisy location.

Visual: It can tough to concentrate when there is a lot activity or other visual distraction in the
area.

Stress: The stress is someone life can make it difficult to concentrate. Stress can be for many
reasons such as family issues, work problems, financial concerns, illness of self or a family member,
and more.

How to adapt style to evidence needs


Intonation
Intonation is variation of pitch while speaking which is not used to distinguish words. It contrasts
with tone, in which pitch variation does distinguish words. Intonation and stress are two main
elements of linguistic prosody.
All languages use pitch semantically, that is, as intonation, for instance for emphasis, to convey
surprise or irony, or to pose a question.
Rising Intonation means the pitch of the voice increases over time
Falling Intonation means that the pitch decreases with time
Dipping Intonation falls and then rises
Peaking Intonation rises and then falls
Inflexion

A manner of speaking in which the loudness, pitch, or tone of the voice is modified
Business Or Technical Terminology
Technical terminology is the specialized vocabulary of any field not just technical field.

Vocabulary
Your success in most every area of life is directly connected to your level of vocabulary knowledge. If
you don't know a lot of English vocabulary, you will struggle. If you know a lot of words, and have a
lot of verbal confidence, you will be able to understand, learn, and express yourself better. Other
people will be more inclined to respect and follow you, and you will be more successful in whatever
you do.
Large vocabulary helps you organize your thoughts with clarity and distinction. Building word power
is a lifelong, ongoing process, and Learn That Word is the perfect tool to guide you along. If you are
sure of what you know your confidence will nurture everything you say, write or do.

How to reduce listing barriers


Communication is a vital part of any relationship. When affective communication is interrupted or
not executed properly, it can lead to misunderstandings that might hurt the relationship. There are
barriers to communication that must be overcome by the speaker. It is possible to reduce those
barriers so proper communication can take place.

Choose the best communication channel for your specific message. A communication channel
is the way in which you communicate. For example, phone calls, texts, email, and face-to-face are all
communication channels. If your message is long or complicated, an email or text is not suitable. If

you're worried about becoming too angry during a face-to-face conversation, then maybe an email is
the way to go.

Choose an appropriate time to have a conversation. If you want to ask your boss for a raise,
you should not do so during the company's busiest week, or you risk your boss not being able to
listen or absorb what you're saying.

Speak clearly when talking to someone. This doesn't just refer to the volume or annunciation
of your message, but also the terms you are using. Many times doctors will explain a patient's
condition to them in medical terms, which most patients are not familiar with, so the patient walks
away confused. Do not use slang or terminology that the listener is not familiar with.

Listen when the other person is speaking. Instead of thinking about what you will say next,
actually take in what the other person is saying so you are able to receive their message, as well.
Cultural Difference
Cultural differences are the variations in the way of life, beliefs, traditions and laws between
different countries, religions, societies and people. Many people see culture as an all-encompassing
overview of large groups of people. However, the word culture can be used to describe the way of
life of much smaller groups.
The most common meaning of culture, as suggested, is that of large groups of people and how their
lifestyles and beliefs differ; this is where cultural differences come in. Where we live and what we
believe has a great impact on all aspects of our life whether we realise it or not. Some of the
differences between cultures are enforced by internal rules (such as legal age of marriage) whereas
others just happen through many years of development towards a certain way over another.

Assignment 7: working with ICT hardware

For this assignment I have been asked to provide support and advice in assessing and
minimising risks related to work activities such as:Effects on customer operations
Loss or corruption of data
Loss of service
Damage to equipment

For each point I will explain the meaning of the statement and then talk about an example
where advice would have been given to a student here at Acculearn.
Effect on Customer Operations
The customers that we deal with here at Acculearn are students that our fee earners will
represent in a certain manner. With that being the case; we need a secure and legitimate way
of keeping track of every step we are involved with our students.

Creating a student and uploading all the documents are produced on each matter is the main
advantage of having Student Management System, allowing us to keep all the information in
track for meetings with students.
To help ensure that students have all the information they need on both of these programs, we
will talk them through the basics when they attend their induction training. We then supplied
any further documents on the intranet in the Help section, where student can look for advice
and information on certain activity. So say a student would like a refresher on how to create a
new student on Student Management System, they would simply connect to the intranet
(which we set as everyone homepage when they open internet explorer.) and on the toolbar
across the top select Help. Inside will be a folder labelled Student Management System
which contains a word document explaining every point used in adding a contact to the
database.
We however do have some occurrences that required our assistance; most commonly due to
the fact the student may lose connection to the Student Management System server. In this
situation the solution is a simple fix, but we will talk the student through the steps for future
references if this problem occurs again. All the students need to do is the following steps:Close all Microsoft Office programs that you are currently using completely
Close down any Student Management System program or application you may be using
Open Task Manager and stop the process called DAPSER-1.EXE
Re-open all previously closed programs and continue with your work

Loss or corruption of data


One thing student always panic about is if they lose an important document due to corruption
or a problem with the system. So we try and limit the chances of this happening with a few
simple steps, that at the end of the day will save us and the students much hassle down the
road in the future.
Back-up Tapes
The first step to this is making sure we have a backup of everything saved on any file server
during the week. We achieved this with back-up tapes that are placed into each server at the
end of every working day. This then insures that we have a back-up for every document that
has been created and saved on all student areas during that certain day, so in the chance a
student accidently loses a file or document they need desperately for a case, we just insert the
last day back-up into the file server, connect up to the back-up server and recover the
document from there.
We also have back-up tapes that are used at certain times, like a weekly tape that we insert
every Monday evening, to ensure that we have a copy of everything at the start of the week.
This tape is an emergency back-up of all the data and servers that we have on the system, and
in the situation where we may lose all of this information due to whatever reason, we will be
able to continue working by just reinserting this tape into the system. We then also do a
monthly back-up tape on the last Friday of every month, ensuring again that we have a copy
of the month work from the students.

Archiving data
This is a simple procedure that can save a lot of hassle later down the line if a student was to
encounter a problem. The data in question here are the emails accounts of every student that
study here at Acculearn. Whenever we have a new student start at Acculearn they are given
two things, a studentname login and an email account. This account will allow them to
communicate with their fellow employees and students about matters involved around their
job.
Problem is over time with the influx of emails and documents, the student mailbox size will
increase to an unstable proportion. This is when we will ask them to use a simple technique to
decrease the size of their mailbox, without losing any access to those emails. This is called
archiving, which allows our student to select whatever folder they may wish (inbox, sent
items, drafts, etc) and create a .pst file, which is then saved onto the local disk.
Loss of service
There will sometimes be circumstances that will cause a server running in an office to crash
and stop working. Whether it is because a drive has failed or the server itself just got too hot
and shut down under the intense heat, they will just sometimes stop working, therefore
creating problems for our students and us in IT. Recently we had the file server in our own
Ilford office go offline, which meant several functions and services were then unavailable to
our students. We sent an email around the office explaining what to do and not to do for
the time being.
Saving documents
Once the file server goes down, students will experience difficulty in accessing drives and
documents that they have previously used in the past. This is mainly because the root of the
drives are located on the local file server, so with it being down and inaccessible people
wont be able to save or open saved documents. In this situation we advise people to save any
documents they are working on during the outage, onto their desktop or My Documents
folder. Then once we have solved the problem and restored the server to it normal state that
they then transfer across any files produced during the down time onto their home drive, to
avoid the risk of exceeding the profile size limit on the computer.
Network connection problems
We do also sometimes lose the network connection in an office, meaning that such activities
as searching the internet and sending emails to students and other students. When a situation
like this arises, we would make sure we contact our network provider so we know that the
problem is being dealt with while we deal with our own students and their predicaments.
Another problem we encounter when the network is down is the loss of calling desktop
phones internally; this means that we must use the direct dial extension to get hold of people
in the outer office. We would make sure that we contact the member of staff that is currently
on reception, due to the fact they are responsible to retrieving calls from students and passing
them onto the fee earner needed.

We need to make sure that they can still receive calls from external numbers, because if this
is not the case we must contact our phone system provider and ask them to forward all calls
to that administrators company provided phone, where we can then control the distribution
of the calls ourselves to whichever office may need them . For the students within that office,
their calls would be transferred over from our reception directly to their phones so they can
then communicate with the caller.
Damage to equipment
Firstly when every student starts here they are given the basic items, a keyboard, a mouse and
a computer. Obviously then depending on their job title they are then given any extra
equipment (headphones, foot pedals, dictation devices, etc), but we always advise people on
the proper use of the equipment within IT communication policy on the intranet.
Certain pieces of advice ranges from simple little measures like setting up the height of your
monitor and computer. Mainly due to health and safety and insuring that we dont get any
complaints about bad backs and sore necks from sitting at awkward angles, we suggest to
people that they set:Monitor at head height (to avoid and neck discomfort)
Keyboard and mouse are a reasonable distance away from the body (to avoid stretching too far)
Make sure your chair is supportive and comfortable on your shoulders and back (if not, make sure
you ask for help adjusting)

The second piece of advice they will receive when reading the document is about when
certain pieces of equipment suddenly stop working or become problematic. We firstly ask
then to contact us either via email or phone, at which point we will go to the student desk and
try and witness or replicate the problem they described earlier.
With regards to damaged equipment here at Acculearn; once we know a certain item is
broken and we cant repair it or it not worth repairing, we place it in basement ready to be
removed at a later date by a removal firm. Obviously we need to abide by the WEEE
regulations (Waste Electrical and Electronic Equipment) otherwise we could face fines for
illegal dumping. So once we have established that a piece of equipment is broken, we supply
the student with a replacement of that certain object while taking the old one away for storage
in the basement which will be removed at a later date.

Вам также может понравиться