Monday, May 11, 2009

ICAT4221B Locate equipment, system and software faults

1: Rectify fault and test

This unit will show you about rectifying faults, testing for the success of the solution and perform acceptance testing of the system to ensure the problem has been satisfactorily solved.
Outcomes for this unit
After completing this learning pack you will be able to
.Rectify possible causes, testing for the success of the solution
.Test the system to ensure the problem has been solved
Activity 1.1: Action Plan
This activity will require you to prepare an action plan for a given fault. The fault is described below. You will need to formulate this plan in fairly generic terms since you would be working without having had exposure to the system described.
The fault
You have been assigned to troubleshoot a network server. The server has been operational for over 18 months and has recently started to experience some problems. The symptoms described are as follows:
.System hangs intermittently when accessing disk drives
.The Windows 2000 Event Log shows several entries relating to I/O and CRC errors
.The lights in front of the RAID enclosure sometimes blink continuously, even when .disk activity is nonexisten.
.You suspect that the RAID subsystem is failing
Q: How would you develop an action plan, which will enable you get to the bottom of this problem?
A: An appropriate action plan would incorporate the following characteristics\

.Identifies the systems or components affected or impacted
.Identify the objectives of the plan (i.e. restore optimum functionality)
.Identifies resources needed, including hardware, software, human, procedures
.Identify severity and criticality, hence priority
.Identifies a timeframe for implementation, according to priority
.Identifies any support contracts that might exist and be applicable to system in question
.Indicates actual remedial steps to be taken. This might include system .reconfiguration, re-installation, software patches, component replacement, consultation with vendors to engage as needed
.Indicate risks including expected disruption as result of remedial action
.Identify a workaround solution in case previous steps failed to provide to rectify fault
Note: that not all items in the list from above should be included, but they should at least be considered. An appropriate way for developing this action plan would to use a pre-existing form, available as an organisational document.

Note: that quite often, highly featured help desk software would include all of the above items as part of the standard description of faults and their management.

Activity 1.2: Rollback strategy

This activity will require you to devise a rollback strategy based on the scenario from the previous activity. The fault is described below.
The fault
.You have been assigned to troubleshoot a network server. The server has been operational for over 18 months and has recently started to experience some problems.
.The symptoms described are as follows:
.System hangs intermittently when accessing disk drives
.The Windows 2000 Event Log shows several entries relating to I/O and CRC errors
.The lights in front of the RAID enclosure sometimes blink continuously, even when
disk activity is nonexistent
You suspect that the RAID subsystem is failing.

Q: How would you develop a rollback strategy for this situation?

A: A rollback strategy is a series of steps or measures that would enable you to restore the system being troubleshot to the state prior to troubleshooting beginning.

In this particular case, you rollback strategies would have considered the following:

.Steps from action plan may be reversed or equivalent system status can be achieved with alternative steps
.No data loss will be incurred. Full system and data backups are to be made before enacting the action plan
.Spare components are available, if needed
.Expertise is available for system reconfiguration. This might include internal .personnel and external (vendors or contractors)
.An alternative solution is available. ie backup server
.The consequences and impact of the rollback are understood
Activity 1.3: Acceptance Testing

This activity will require you to devise an acceptance test procedure based on the scenario from the previous activity. The fault is described below.

The fault

You have been assigned to troubleshoot a network server. The server has been operational for over 18 months and has recently started to experience some problems.


The symptoms described are as follows:

.System hangs intermittently when accessing disk drives
.The Windows 2000 Event Log shows several entries relating to I/O and CRC errors
,.The lights in front of the RAID enclosure sometimes blink continuously, even when disk activity is nonexistent
.You suspect that the RAID subsystem is failing.

Q: How would you develop an acceptance test procedure?

A: The development of an Acceptance Test involves a number of iterative steps:

1.Assess the type of testing required
2.Develop the procedures and instructions for testing
3.Develop the necessary test scripts
4.Execute the test scripts
5.Report any defects
6.Retest any fixes
Your acceptance test procedure might have included some of the following items:

1.Test type to be carried out ie simple, iterative, sequential
2.Instructions to be carried out ie any necessary preparations such as installation of monitoring software, auditing, load testing, benchmarking
3.The sequence (order) of tests to be done
4.Resulting data that will be analysed following the execution of tests ie reports, charts, benchmarking results, system log events
5.Definitions of what constitutes failure. Criteria or metrics to be stipulated here ie repetition of original symptoms, new symptoms
6.Repetition of testing after new fixes actioned
2: Obtain appropriate fault-finding tools

Fault-finding is a crucial skill in the life of the IT professional, no matter what area of IT you are in. Fault finding can be very challenging indeed, yet being able to solve a difficult problem can bring enormous satisfaction and recognition. The good news is that fault-finding skills can be developed. Fault-finding is a skill that will accompany you throughout your professional career.

The aim of this unit is to allow you to develop an understanding for fault-finding tools and methods. You will have an opportunity to practise using fault-finding tools and methods to solve real problems.

In this topic, you will have an opportunity to learn about tools that are used for fault-finding and troubleshooting purposes. You will also learn about generic cyclic fault-finding methods. Additionally, you will have an opportunity to practise fault-finding using commonly available tools for a range of computer systems, both standalone and networked.

Outcomes for this unit

After completing this learning pack you will be able to:

.Analyse and document the system that requires troubleshooting
.Research specifically designed troubleshooting tools for the system
.Investigate generic cyclic fault finding tools
.Obtain required specialist tools
This activity will require you to use the Internet to search for fault-finding tools that might be appropriate for an IT environment.

Use the following as search criteria:

. One software-based tool that performs standalone PC diagnostics. This tool must be freeware/open source/GNU GPL.
. One software-based tool that performs standalone PC diagnostics. This tool must be commercial.
.One software based tool that performs network diagnostics, for example, network discovery, packet capture and analysis. This tool must be freeware/open source/GNU GPL.
. One software based tool that performs network diagnostics, for example, network discovery, packet capture and analysis. This tool must be commercial
Q: What fault finding tools did you find that might be appropriate for an IT environment?

A: There are literally hundreds of software-based tools available. The real challenge is to be able to sort through them all and find the ones that will enhance your ability to find problems and fix them. Some possible answers are listed below:

.Sandra,
.Systemworks,
.Ethereal,
.Fluke Network Inspector, and
.Protocol Inspector.
.Activity 2.2: Hardware tools

The aim of this activity is for you to find out about hardware based tools that can assist you in the troubleshooting process. You will use the Internet, trade magazines and books to find out about hardware tools. Use the following criteria to narrow down your search.

You need to find:

Tuesday, May 5, 2009

ICAS4108B Complete database back-up and recovery

Database Backup and Recovery
Most of database systems have incorporated backup and recovery tools into their interfaces and infrastructure it is a good idea to understand what the backup and recovery process involves, beyond the work flow of using the tools. With the growing dependency in the workplace on information and general, and the information in your database specifically, there has never been a time when safe backups and reliable recoveries were more important. Are you maintaining your databases properly? Do they participate in a backup and recovery routine that checks on the health of the data? If you are not 100% sure of this, then you need to find out.
Database Backup and Recovery Needs

It is not just the data files that need to be part of the backup process. You must also backup the transaction logs of the database as well. Without the transaction logs the data files are useless in a recovery event. How often you choose to perform these backup routines is really dependent on the data requirements of your company. If you do not know what those are then you need to find out either by referring to them or asking for them to be created through a research and investigation process.
Backup and Recovery and Database Failure
Failure can happen for any number of reasons. There are three main ones that recur enough to be worth incorporating into your backup and recovery plan. User error is the number one reason for data damage, loss, or corruption. Included in this type of failure is an application modifying or destroying the data on its own or through a user choice. Recovery and restore to the point in time before the corruption occurred.
This returns the data to a clean position at the cost of any other changes that were being made to the data since the point the corruption took place. Any lost work will need to be re-entered or processes repeated if necessary.
Media failure can also cause data loss or damage. Media failure can happen when the media the data files or transaction logs are stored on fail. Most databases will be stored on computer hard drives or across groups of hard drives on designated servers. Hard drives are mechanical devices, just like automobiles, and are made up of parts and pieces that work together. Mechanical devices are known for failure and will need to be replaced once, or if, the data has been retrieved from them.
Backup and Recovery and Disaster
The third reason for database failure is a disastrous or catastrophic event. This can be in the form of fire, flood, or any naturally occurring storm. It can also happen through electrical outage, a virus, or the deliberate hacking of your data. Any of these can corrupt or cause the loss of your data. The true disaster will be the lack of data backup and or the lack of a recovery plan. Without data backup recovery is impossible. And without a recovery plan there is no guarantee that your data backup will make it through the recovery process.

This chapter assumes that some or all of your datafiles are lost or damaged. Typically, this situation is caused by a media failure or accidental deletion. Your goal is to return the database to normal operation by restoring the damaged files from RMAN backups and recovering all database changes.
Scope of This Chapter
This chapter explain how to use complete recovery to fix the most common database problems. This chapter makes the following assumptions:
You have lost some or all datafiles and your goal is to recover all changes, but you have not lost all current control files or an entire online redo log group.

.Your database is using the current server parameter file.

.You have the complete set of archived redo logs and incremental backups needed for recovery of your datafile backups. Every datafile either has a backup, or a complete set of online and archived redo logs goes back to the creation of a datafile with no backup.

.RMAN can handle lost datafiles without user intervention during restore and recovery. When a datafile is lost, the possible cases can be classified as follows:

oThe control file knows about the datafile, that is, you backed up the control file after datafile creation, but the datafile itself is not backed up. If the datafile record is in the control file, then RESTORE creates the datafile in the original location or in a user-specified location. The RECOVER command can then apply the necessary logs to the datafile.

oThe control file does not have the datafile record, that is, you did not back up the control file after datafile creation. During recovery, the database will detect the missing datafile and report it to RMAN, which will create a new datafile and continue recovery by applying the remaining logs. If the datafile was created in a parent incarnation, then it will be created during the restore or recovery phase as appropriate.

.You are not restoring and recovering an encrypted tablespace.

If you perform media recovery on an encrypted tablespace, then the Oracle wallet must be open when performing media recovery of this tablespace. See Oracle Database Administrator's Guide to learn about encrypted tablespaces.

.You are using the RMAN client rather than Oracle Enterprise Manager.

Enterprise Manager provides access to RMAN through a set of wizards. These wizards lead you through a variety of recovery procedures based on an analysis of your database, your available backups, and your data recovery objectives.

By using Enterprise Manager, you can perform the simpler restore and recovery scenarios outlined in this chapter. You can also use more sophisticated restore and recovery techniques such as point-in-time recovery and database flashback, which allow for efficient repair of media failures and user errors. In most cases, using Enterprise Manager is simpler than using the RMAN command-line client directly

Preparing for Complete Database Recovery

While RMAN simplifies most database restore and recovery tasks, you must still plan your database restore and recovery strategy based on which database files have been lost and your recovery goal. This section contains the following topics:


.Identifying the Database Files to Restore or Recover

.Determining the DBID of the Database

.Previewing Backups Used in Restore Operations

.Validating Backups Before Restoring Them

.Restoring Archived Redo Logs Needed for Recovery

Identifying the Database Files to Restore or Recover
The techniques for determining which files require restore or recovery depend upon the type of file that is lost.
It is usually obvious when the control file of your database is lost. The database shuts down immediately when any of the multiplexed control files becomes inaccessible. Also, the database reports an error if you try to start it without a valid control file at each location specified in the CONTROL_FILES initialization parameter.
Loss of some but not all copies of your control file does not require you to restore a control file from backup. If at least one control file remains intact, then you can either copy an intact copy of the control file over the damaged or missing control file, or update the initialization parameter file so that it does not refer to the damaged or missing control file. After the CONTROL_FILES parameter references only present, intact copies of the control file, you can restart your database.

If you restore the control file from backup, then you must perform media recovery of the whole database and then open it with the OPEN RESETLOGS option, even if no datafiles need to be restored. This technique is described in "Performing Recovery with a Backup Control File".

Identifying Datafiles Requiring Media Recovery

When and how to recover depends on the state of the database and the location of its datafiles.

Identifying Datafiles with RMAN
An easy technique for determining which datafiles are missing is to run a VALIDATE DATABASE command, which attempts to read all specified datafiles. For example, start the RMAN client and run the following commands to validate the database (sample output included).
Example 17-1 BACKUP VALIDATE DATABASE
RMAN> VALIDATE DATABASE;Starting validate at 20-OCT-06allocated channel: ORA_DISK_1channel ORA_DISK_1: SID=90 device type=DISKcould not read file header for datafile 7 error reason 4RMAN-00571: ===========================================================RMAN-00569: =============== ERROR MESSAGE STACK FOLLOWS ===============RMAN-00571: ===========================================================RMAN-03002: failure of backup command at 10/20/2007 13:05:43RMAN-06056: could not access datafile 7The output in Example 17-1 indicates that datafile 7 is inaccessible. You can then run the REPORT SCHEMA command to obtain the tablespace name and filename for datafile 7 as follows (sample output included):

RMAN> REPORT SCHEMA;
Report of database schema
for database with db_unique_name
RDBMSList of Permanent

Datafiles===========================
File Size(MB) Tablespace
RB segs Datafile
Name---- -------- -------------------- ------- ------------------------1
450 SYSTEM *** +DATAFILE/tbs_01.f2 86 SYSAUX *** +DATAFILE/tbs_ax1.f3
15 UD1 *** +DATAFILE/tbs_undo1.f4
2 SYSTEM *** +DATAFILE/tbs_02.f5 2 TBS_1 *** +DATAFILE/tbs_11.f6 2 TBS_1 *** +DATAFILE/tbs_12.f7 2 TBS_2 *** +DATAFILE/tbs_21.fList of Temporary


Files=======================File Size(MB)
Tablespace Maxsize(MB)
Tempfile
Name---- -------- -------------------- ----------- --------------------1 40 TEMP 32767
+DATAFILE/tbs_tmp1.f

Although VALIDATE DATABASE is a good technique for determining whether files are inaccessible, you may want to use SQL queries to obtain more detailed information.

To determine whether datafiles require media recovery:

1-Start SQL*Plus and connect to the target database instance. For example, issue the following commands to connect to trgt:

sqlplusSQL> CONNECT SYS/password@trgt AS SYSDBA
2-Determine the status of the database by executing the following SQL query:

3-SELECT STATUS FROM V$INSTANCE;If the status is OPEN, then the database is open. Nevertheless, some datafiles may require media recovery.

Query V$DATAFILE_HEADER to determine the status of your datafiles. Run the following SQL statements to check the datafile headers:

COL FILE# FORMAT 999COL
STATUS FORMAT A7
COL ERROR FORMAT A10
COL TABLESPACE_NAME FORMAT A1
0COL NAME FORMAT A30SELECT FILE
#, STATUS, ERROR, RECOVER, TABLESPACE_NAME, NAMEFROM V$DATAFILE_HEADERWHERE RECOVER = 'YES'OR (RECOVER IS NULL AND ERROR IS NOT NULL);
Each row returned represents a datafile that either requires media recovery or has an error requiring a restore. Check the RECOVER and ERROR columns. RECOVER indicates whether a file needs media recovery, and ERROR indicates whether there was an error reading and validating the datafile header.

If ERROR is not NULL, then the datafile header cannot be read and validated. Check for a temporary hardware or operating system problem causing the error. If there is no such problem, you must restore the file or switch to a copy.

If the ERROR column is NULL and the RECOVER column is YES, then the file requires media recovery (and may also require a restore from backup).

Note:
Because V$DATAFILE_HEADER only reads the header block of each datafile, it does not detect all problems that require the datafile to be restored. For example, this view cannot tell whether a datafile contains corrupt data blocks.
4-Optionally, query V$RECOVER_FILE to list datafiles requiring recovery by datafile number with their status and error information. For example, execute the following query
SELECT FILE#, ERROR, ONLINE_STATUS, CHANGE#, TIMEFROM V$RECOVER_FILE;

Note:

You cannot use V$RECOVER_FILE with a control file restored from backup or a control file that was re-created after the time of the media failure affecting the datafiles. A restored or re-created control file does not contain the information needed to update V$RECOVER_FILE accurately.
To find datafile and tablespace names, you can also perform useful joins using the datafile number and the V$DATAFILE and V$TABLESPACE views. For example:
COL DF# FORMAT 999
COL DF_NAME FORMAT A35
COL TBSP_NAME FORMAT A7
COL STATUS FORMAT A7
COL ERROR FORMAT A10
COL CHANGE# FORMAT 99999999SELECT r.FILE
# AS df#, d.NAME AS df_name,
t.NAME AS tbsp_name,
d.STATUS, r.ERROR, r.CHANGE#,
r.TIMEFROM V$RECOVER_FILE r, V$DATAFILE d, V
$TABLESPACE tWHERE t.TS# = d.TS#AND d.FILE# = r.FILE#;The ERROR column identifies the problem for each file requiring recovery.

Determining the DBID of the Database

In situations requiring the recovery of your server parameter file or control file from autobackup, you need to know the DBID. You should record the DBID along with other basic information about your database.

.If you do not have a record of the DBID of your database, then you can find it in the following places without opening your database:

.The DBID is used in forming the filename for the control file autobackup. Locate this file, and then refer to "Configuring the Control File Autobackup Format" to determine where the DBID appears in the filename.

.If you have any text files that preserve the output from an RMAN session, then the DBID is displayed by the RMAN client when it starts up and connects to your database. Typical output follows:

.% rman TARGET /Recovery Manager: Release 11.1.0.6.0 - Production on Wed Jul 11 17:51:30 2007Copyright (c) 1982, 2007, Oracle. All rights reserved.connected to target database: PROD (DBID=36508508
Previewing Backupa Used in Restore Operations
You can apply RESTORE ... PREVIEW to any RESTORE operation to create a detailed list of every backup to be used in the requested RESTORE operation, as well as the necessary target SCN for recovery after the RESTORE operation is complete. This command accesses the RMAN repository to query the backup metadata, but does not actually read the backup files to ensure that they can be restored.
As an alternative to RESTORE ... PREVIEW, you can use the RESTORE ... VALIDATE HEADER command. In addition to listing the files needed for restore and recovery, the RESTORE ... VALIDATE HEADER command validates the backup file headers to determine whether the files on disk or in the media management catalog correspond to the metadata in the RMAN repository.
When planning your restore and recovery operation, use RESTORE ... PREVIEW or RESTORE ... VALIDATE HEADER to ensure that all required backups are available or to identify situations in which you may want to direct RMAN to use or avoid specific backups.
To preview backups to be used in a restore operation
1-Run a RESTORE command with the PREVIEW option.
For example, run one of the following commands:

RESTORE DATABASE PREVIEW;RESTORE ARCHIVELOG FROM TIME 'SYSDATE-7' PREVIEW;If the report produced by RESTORE ... PREVIEW provides too much information, then specify the SUMMARY option as shown in the following example:

RESTORE DATABASE PREVIEW SUMMARY;If satisfied with the output, then stop here. If the output indicates that RMAN will request a backup from a tape that you know is temporarily unavailable, then continue with this procedure. If the output indicates that a backup is stored offsite, then skip to "Recalling Offsite Backups".

2-If needed, use the CHANGE command to set the backup status of any temporarily unavailable backups to UNAVAILABLE.
"Updating a Backup to Status AVAILABLE or UNAVAILABLE" explains how to perform this task.
3-Optionally, run RESTORE ... PREVIEW again to confirm that the restore will not attempt to use unavailable backups.
Recalling Offsite Backups
Some media managers provide status information to RMAN about which backups are offsite. An offsite backup is stored in a remote location, such as a secure storage facility, and cannot be restored unless the media manager retrieves the media.

Offsite backups are marked as AVAILABLE in the RMAN repository even though the media must be retrieved from storage before the backup can be restored. If RMAN attempts to restore a offsite backup, then the restore job fails.

You can use RESTORE ... PREVIEW to identify offsite backups. The command output indicates whether backups are stored offsite, as shown by the text at the end of the sample output in Example 17-2.

List of Backup Sets===================BS Key Size Device Type Elapsed Time Completion Time------- ---------- ----------- ------------ ---------------
9 2.25M SBT_TAPE 00:00:00 21-MAY-07 BP Key: 9 Status: AVAILABLE Compressed: NO Tag: TAG20070521T144258 Handle: 0aii9k7i_1_1 Media: 0aii9k7i_1_1 List of Archived Logs in backup set 9 Thrd Seq Low SCN Low Time Next SCN Next Time ---- ------- ---------- --------- ---------- ---------
1 1 392314 21-MAY-07 392541 21-MAY-07 1 2 392541 21-MAY-07 392545 21-MAY-07 1 3 392545 21-MAY-07 392548 21-MAY-07 1 4 392548 21-MAY-07 395066
21-MAY-07 1 5 395066 21-MAY-07 395095 21-MAY-07 1 6 395095
21-MAY-07 395355 21-MAY-07List of remote backup
files============================
Handle: aii9k7i_1_1 Media: 0aii9k7i_1_1validation succeeded for backup pieceFinished restore at 21-MAY-07released channel: dev1You can use RESTORE ... PREVIEW RECALL to instruct the media manager to make offsite backups available.

To recall offsite backups:
1-If backups are stored offsite, then execute a RESTORE ... PREVIEW command with the RECALL option.

The following example initiates recall for the offsite archived log backups shown in Example 17-2 (sample output included):

RESTORE ARCHIVELOG ALL PREVIEW RECALL;The following sample output indicates that RMAN initiated a recall:

List of Backup Sets
===================BS Key Size
Device Type Elapsed Time Completion Time
------- ---------- ----------- ------------ ---------------9 2.25M SBT_TAPE 00:00:00 21-MAY-07 BP Key: 9 Status: AVAILABLE Compressed: NO Tag: TAG20070521T144258 Handle: VAULT0aii9k7i_1_1 Media: /tmp,VAULT0aii9k7i_1_1 List of Archived Logs in backup set 9 Thrd Seq Low SCN Low Time Next SCN Next Time
---- ------- ---------- --------- ---------- ---------
1 1 392314 21-MAY-07 392541 21-MAY-07 1 2 392541 21-MAY-07 392545 21-MAY-07 1 3 392545 21-MAY-07 392548 21-MAY-07 1 4 392548 21-MAY-07 395066 21-MAY-07 1 5 395066 21-MAY-07 395095 21-MAY-07 1 6 395095 21-MAY-07 395355 21-MAY-07Initiated recall for the following list of remote backup files
==========================================================
Handle: VAULT0aii9k7i_1_1
Media: /tmp,VAULT0aii9k7i_1_
1validation succeeded for backup
pieceFinished restore at
21-MAY-07
released channel: dev1
2-Run the RESTORE ... PREVIEW command. If necessary, return to
the previous step until no backups needed for the restore are
reported as offsite.

Validating Backups Before Restoring Them

While the procedures in "Previewing Backups Used in Restore Operations" indicate which backups will be restored, they do not verify that the backups are actually usable. You can run RMAN commands to test the availability of usable backups for any RESTORE operation, or test the contents of a specific backup for use in RESTORE operations. The contents of the backups are actually read and checked for corruption. You have the following validation options:
.RESTORE ... VALIDATE tests whether RMAN
can restore a specific object from a backup.
RMAN chooses which backups to use.

. VALIDATE BACKUPSET tests the validity of a backup set that you specify.

Restoring Archived Redo Logs Needed for Recovery
RMAN restore archived redo log files from backup automatically as needed to perform recovery. You can also restore archived redo logs manually to save the time needed to restore these files later during the RECOVER command, or if you want to store the restored archived redo log files in some new location.

By default, RMAN restores archived redo logs with names constructed using the LOG_ARCHIVE_FORMAT and the LOG_ARCHIVE_DEST_1 parameters of the target database. These parameters are combined in a platform-specific fashion to form the name of the restored archived log.

Restoring Archived Redo Logs to a New Location
You can override the default location for restored archived redo logs with the SET ARCHIVELOG DESTINATION command. This command manually stages archived logs to different locations while a database restore is occurring. During recovery, RMAN knows where to find the newly restored archived logs; it does not require them to be in the location specified in the initialization parameter file.
To restore archived redo logs to a new location:
1- After connecting to the target database, ensure the database is mounted or open.
2- Perform the following operations within a RUN block:
The following example explicitly restores all backup archived logs to a new location:
{ SET ARCHIVELOG DESTINATION TO '/oracle/temp_restore'; RESTORE ARCHIVELOG ALL; # restore and recover datafiles as needed
.
.
.}
The following example sets the archived log destination and then uses RECOVER DATABASE to restore archived logs from this destination automatically:
run
c SET ARCHIVELOG DESTINATION TO '/oracle/temp_restore'; RESTORE DATABASE; RECOVER DATABASE; # restores and recovers logs automatically
Restoring Archived Redo Logs to Multiple Locations
You can specify restore destinations for archived logs multiple times in one RUN block, in order to distribute restored logs among several destinations. (You cannot, however specify multiple destinations simultaneously to produce multiple copies of the same log during the restore operation.) You can use this feature to manage disk space used to contain the restored logs.
This example restores 300 archived redo logs from backup, distributing them across the directories /fs1/tmp, /fs2/tmp, and /fs3/tmp:
RUN{ # Set a new location for logs 1 through 100. SET ARCHIVELOG DESTINATION TO '/ fs1/tmp'; RESTORE ARCHIVELOG FROM SEQUENCE 1 UNTIL SEQUENCE 100; # Set a new l ocation for logs 101 through 200. SET ARCHIVELOG DESTINATION TO '/fs2/tmp'; RESTORE ARCHIVELOG FROM SEQUENCE 101 UNTIL SEQUENCE 200; # Set a new location for logs 201 through 300. SET ARCHIVELOG DESTINATION TO ' /fs3/tmp';
RESTORE FROM SEQUENCE 201 UNTIL SEQUENCE 300; # restore and recover datafiles as needed
.
\.
.0
When you issue a RECOVER command, RMAN finds the needed restored archived logs automatically across the destinations to which they were restored, and applies them to the datafiles.
Performing Complete Database Recovery
This section assumes that you have already performed the tasks in "Preparing for Complete Database Recovery". This section describes the basic outline of complete database recovery, which is intended to encompass a wide range of different scenarios.
About Complete Database Recovery
You use the RESTORE and RECOVER commands to restore and recover the database. During the recovery, RMAN automatically restores backups of any needed archived redo logs. If backups are stored on a media manager, then channels must be configured in advance or a RUN block with ALLOCATE CHANNEL commands must be used to enable access to backups stored there.
If RMAN restores archived redo logs to the flash recovery area during a recovery, then it automatically deletes the restored logs after they applying them to the datafiles. Otherwise, you can use the DELETE ARCHIVELOG command to delete restored archived redo logs from disk when they are no longer needed for recovery. For example, you can enter the following command:

RECOVER DATABASE DELETE ARCHIVELOG;
Restoring Datafiles to a Nondefault Location
If you cannot restore datafiles to their default locations, then you must update the control file to reflect the new locations of the datafiles. Use the RMAN SET NEWNAME command within a RUN command to specify the new filename. Afterward, use a SWITCH command, which is equivalent to using the SQL statement ALTER DATABASE RENAME FILE, to update the names of the datafiles in the control file. SWITCH DATAFILE ALL updates the control file to reflect the new names for all datafiles for which a SET NEWNAME has been issued in a RUN command.
Decryption of Backups
If RMAN is restoring encrypted backups, then RMAN automatically decrypts backup sets when their contents are restored. Transparently encrypted backups require no intervention to restore, as long as the encrypted wallet is open and available.
Password-encrypted backups require the correct password to be entered before they can be restored. You must enter the encryption password with the SET DECRYPTION command. If restoring from a group of backups that were created with different passwords, then specify all of the required passwords on the SET DECRYPTION command. RMAN will automatically use the correct password with each backup set.
Performing Complete Recovery of the Whole Database
This scenario assumes that database trgt has lost most or all of its datafiles. It also assumes that the database uses a flash recovery area.

Note: After restore and recovery of a whole database, when the database is opened, any missing temporary tablespaces recorded in the control file are re-created with their previous creation size, AUTOEXTEND, and MAXSIZE attributes. Only temporary tablespaces that are missing are re-created. If a tempfile exists at the location recorded in the RMAN repository but has an invalid header, then RMAN does not re-create the tempfile.
If the tempfiles were originally created as Oracle-managed files, then they are re-created in the current DB_CREATE_FILE_DEST location. Otherwise, they are re-created at their previous locations. If RMAN is unable to re-create the file due to an I/O error or some other cause, then the error is reported in the alert log and the database open operation continues.
To restore and recover the whole database:
1-Start RMAN and connect to the target database.
For example, enter the following command:

% rmanRMAN> CONNECT SYS/password@trgtRMAN displays the database status when it connects: not started, not mounted, not open (when mounted but not open), or none (database is open).
2-If the database is not mounted, then mount but do not open the database
For example, enter the following command:
STARTUP MOUNT;
3-Use the SHOW command to see which channels are preconfigured.

For example, enter the following command (sample output is included):

SHOW ALL;RMAN configuration parameters for database with db_unique_name PROD1 are:
.
.
CONFIGURE DEFAULT DEVICE TYPE TO DISK; # defaultCONFIGURE DEVICE TYPE DISK PARALLELISM 1 BACKUP TYPE TO BACKUPSET; # defaultCONFIGURE DEVICE TYPE SBT_TAPE PARALLELISM 1 BACKUP TYPE TO BACKUPSET; # defaultCONFIGURE CHANNEL DEVICE TYPE 'SBT_TAPE' PARMS "SBT_LIBRARY=/usr/local/oracle/backup/lib/libobk.so";If the necessary devices and channels are already configured, then no action is necessary. Otherwise, you can use the CONFIGURE command to configure automatic channels, or include ALLOCATE CHANNEL commands within a RUN block.
If restoring password-protected encrypted backups, then specify the password.

4-Use the SET DECRYPTION IDENTIFIED BY command to specify a password for password-protected backups. The following example specifies the password mypassword to restore encrypted backups:

SET DECRYPTION IDENTIFIED BY mypassword
5-Restore and recover the database. Do one of the following:

.If you are restoring all datafiles to their original locations, then execute RESTORE DATABASE and RECOVER DATABASE sequentially at the RMAN prompt.

For example, enter the following commands if automatic channels are configured (sample output included):

RMAN> RESTORE DATABASE;
Starting restore at
20-JUN-06allocated channel: ORA
_DISK_1channel ORA_DISK_
1: SID=35 device type=DISKallocated
channel: ORA_SBT_TAPE_1channel ORA_SBT_TAPE_1: SID=34
device type=SBT_TAPEchannel ORA_SBT_TAPE_1:
Oracle Secure Backupchannel ORA_DISK_1:
starting datafile backup set restorechannel
ORA_DISK_1: specifying datafile(s) to
restore from backup setchannel
ORA_DISK_1: restoring datafile 00001 to /disk1/oracle/dbs/tbs_01.fchannel ORA_DISK_1: restoring datafile 00002 to /disk1/oracle/dbs/tbs_ax1.f...
Finished restore at 20-JUN-06RMAN>
RECOVER DATABASE;Starting
recover at 20-JUN-06using
channel ORA_DISK_1allocated channel: ORA_SBT_TAPE_1channel ORA_SBT_TAPE_1: SID=34 device type=SBT_TAPEchannel ORA_SBT_TAPE_1: Oracle Secure
Backupstarting media recoverychannel ORA_DISK_1:
starting archived log restore to default
destinationchannel ORA_DISK_1:
restoring archived logarchived log thread=1
sequence=5channel ORA_DISK_1: restoring archived
logarchived log thread=1 sequence=6.

media recovery complete, elapsed time: 00:00:15Finished recover at 20-JUN-06If you manually allocate channels,
then you must issue the RESTORE and RECOVER commands together within
a RUN block as shown in the following example:

RUN{ ALLOCATE CHANNEL c1 DEVICE TYPE sbt;
RESTORE DATABASE; RECOVER DATABASE;}
If you are restoring some datafiles to new locations,
then execute RESTORE DATABASE and RECOVER
DATABASE sequentially in a RUN command.
Use the SET NEWNAME to rename datafiles,
as described in "Restoring
Datafiles to a Nondefault Location".

The following example restores the database,
specifying new names for three of the datafiles,
and then recovers the database:

RUN{ SET NEWNAME FOR DATAFILE 2 TO '/disk2/df2.dbf';
SET NEWNAME FOR DATAFILE 3 TO '/disk2/df3.dbf';
SET NEWNAME FOR DATAFILE 4 TO '/disk2/df4.dbf'; RESTORE DATABASE; SWITCH DATAFILE ALL; RECOVER DATABASE;}Examine the output to see if media
6-recovery was successful. If so, open the database.

For example, enter the following command:

ALTER DATABASE OPEN

Performing Complete Recovery of a Tablespace

\
In the basic scenario, the database is open, and some but not all of the datafiles are damaged. You want to restore and recover the damaged tablespace while leaving the database open so that the rest of the database remains available. This scenario assumes that database trgt has lost tablespace tbs_3.
Start RMAN and connect to the target database.

For example, enter the following command:

% rmanRMAN> CONNECT SYS/password@trgtRMAN displays the database status when it connects: not started, not mounted, not open (when mounted but not open), or none (database is open).

2-If the database is not mounted, then mount but do not open the database.

For example, enter the following command:

STARTUP MOUNT;Use the SHOW command to see which channels are preconfigured.

For example, enter the following command (sample output is included):

SHOW ALL;
3-RMAN configuration parameters for database with db_unique_name PROD1 are:...CONFIGURE DEFAULT DEVICE TYPE TO DISK; # defaultCONFIGURE DEVICE TYPE DISK PARALLELISM 1 BACKUP TYPE TO BACKUPSET; # defaultCONFIGURE DEVICE TYPE SBT_TAPE PARALLELISM 1 BACKUP TYPE TO BACKUPSET; # defaultCONFIGURE CHANNEL DEVICE TYPE 'SBT_TAPE' PARMS "SBT_LIBRARY=/usr/local/oracle/backup/lib/libobk.so";If the necessary devices and channels are already configured, then no action is necessary. Otherwise, you can use the CONFIGURE command to configure automatic channels, or include ALLOCATE CHANNEL commands within a RUN block.

4-If restoring password-protected encrypted backups, then specify the password.

Use the SET DECRYPTION IDENTIFIED BY command to specify a password for password-protected backups. The following example specifies the password mypassword to restore encrypted backups:

SET DECRYPTION IDENTIFIED BY mypassword;Restore and recover the database. Do one of the following:

If you are restoring all datafiles to their original locations, then execute RESTORE DATABASE and RECOVER DATABASE sequentially at the RMAN prompt.

5-For example, enter the following commands if automatic channels are configured (sample output included):

RMAN> RESTORE DATABASE;Starting restore at 20-JUN-06allocated channel: ORA_DISK_1channel ORA_DISK_1: SID=35 device type=DISKallocated channel: ORA_SBT_TAPE_1channel ORA_SBT_TAPE_1: SID=34 device type=SBT_TAPEchannel ORA_SBT_TAPE_1: Oracle Secure Backupchannel ORA_DISK_1: starting datafile backup set restorechannel ORA_DISK_1: specifying datafile(s) to restore from backup setchannel ORA_DISK_1: restoring datafile 00001 to /disk1/oracle/dbs/tbs_01.fchannel ORA_DISK_1: restoring datafile 00002 to /disk1/oracle/dbs/tbs_ax1.f...Finished restore at 20-JUN-06RMAN> RECOVER DATABASE;Starting recover at 20-JUN-06using channel ORA_DISK_1allocated channel: ORA_SBT_TAPE_1channel ORA_SBT_TAPE_1: SID=34 device type=SBT_TAPEchannel ORA_SBT_TAPE_1: Oracle Secure Backupstarting media recoverychannel ORA_DISK_1: starting archived log restore to default destinationchannel ORA_DISK_1: restoring archived logarchived log thread=1 sequence=5channel ORA_DISK_1: restoring archived logarchived log thread=1 sequence=6...channel ORA_DISK_1: reading from backup piece /disk1/oracle/work/orcva/TKRM/backupset/2007_06_20/o1_mf_annnn_TAG20070620T113128_29jhr197_.bkpchannel ORA_DISK_1: piece handle=/disk1/oracle/work/orcva/TKRM/backupset/2007_06_20/o1_mf_annnn_TAG20070620T113128_29jhr197_.bkp tag=TAG20070620T113128channel ORA_DISK_1: restored backup piece 1channel ORA_DISK_1: restore complete, elapsed time: 00:00:02archived log file name=/disk1/oracle/work/orcva/TKRM/archivelog/2007_06_20/o1_mf_1_5_29jhv47k_.arc thread=1 sequence=5channel default: deleting archived log(s)...media recovery complete, elapsed time: 00:00:15Finished recover at 20-JUN-06If you manually allocate channels, then you must issue the RESTORE and RECOVER commands together within a RUN block as shown in the following example:

RUN{ ALLOCATE CHANNEL c1 DEVICE TYPE sbt;
RESTORE DATABASE; RECOVER DATABASE;}
If you are restoring some datafiles to new locations,
then execute RESTORE DATABASE and RECOVER DATABASE sequentially in a RUN command. Use the SET NEWNAME to rename datafiles, as described in "Restoring Datafiles to a Nondefault Location".

..The following example restores the database,
specifying new names for three of the datafiles, and then recovers the database:

RUN{ SET NEWNAME FOR DATAFILE 2
TO '/disk2/df2.dbf'; SET NEWNAME FOR
DATAFILE 3 TO '/disk2/df3.dbf';
SET NEWNAME FOR DATAFILE 4 TO '/disk2/df4.dbf';
RESTORE DATABASE; SWITCH DATAFILE ALL;
RECOVER DATABASE;}Examine the output to see if media recovery was successful. If so, open the database.

6-For example, enter the following command:

ALTER DATABASE
Performing Complete Recovery of a Tablespace
In the basic scenario, the database is open, and some but not all of the datafiles are damaged. You want to restore and recover the damaged tablespace while leaving the database open so that the rest of the database remains available. This scenario assumes that database trgt has lost tablespace tbs_3.
To restore and recover a tablespace:

1-Start RMAN and connect to the target database.

For example, enter the following command:

% rmanRMAN> CONNECT SYS/password@trgtRMAN displays the database status when it connects: not started, not mounted, not open (when mounted but not open), or none (database is open).

2-If the database is open, then take the datafile requiring recovery offline.

For example, enter the following command to take tbs_3 offline:

SQL "ALTER TABLESPACE tbs_3 OFFLINE IMMEDIATE";Use the SHOW command to see which channels are preconfigured.

3-For example, enter the following command (sample output is included):

SHOW ALL;
RMAN configuration parameters for database with
db_unique_name PROD1 are:...CONFIGURE DEFAULT DEVICE TYPE TO
DISK; # defaultCONFIGURE DEVICE TYPE DISK PARALLELISM
1 BACKUP TYPE TOBACKUPSET; # defaultCONFIGURE DEVICE TYPE SBT_TAPE PARALLELISM 1 BACKUP TYPE TO BACKUPSET; # defaultCONFIGURE CHANNEL DEVICE TYPE 'SBT_TAPE' PARMS "SBT_LIBRARY=/usr/local/oracle/backup/lib/libobk.so";If the necessary devices and channels are already configured, then no action is necessary. Otherwise, you can use the CONFIGURE command to configure automatic channels, or include ALLOCATE CHANNEL commands within a RUN block.

4-If restoring password-protected backups, then specify the password.

Use the SET DECRYPTION IDENTIFIED BY command to specify a password for password-protected backups. The following example specifies the password mypassword to restore encrypted backups:

SET DECRYPTION IDENTIFIED BY mypassword;Restore and recover the tablespace. Do one of the following:

If you are restoring datafiles to their original locations, then run the RESTORE TABLESPACE and RECOVER TABLESPACE commands at the RMAN prompt.

For example, enter the following command
if automatic channels are configured (sample output included):

RMAN>
5- RESTORE TABLESPACE tbs_3;Starting restore at 20-JUN-06allocated channel: ORA_DISK_1channel ORA_DISK_1: SID=37 device type=DISKallocated channel: ORA_SBT_TAPE_1channel ORA_SBT_TAPE_1: SID=38 device type=SBT_TAPEchannel
ORA_SBT_TAPE_1: Oracle Secure Backupchannel ORA_
DISK_1: starting datafile backup set restorechannel ORA_DISK_1: specifying datafile(s) to restore from backup setchannel ORA_DISK_1: restoring datafile 00012 to /disk1/oracle/dbs/tbs_31.fchannel ORA_DISK_1: restoring datafile 00013 to /disk1/oracle/dbs/tbs_32.fchannel ORA_DISK_1: restoring datafile 00021 to /disk1/oracle/dbs/tbs_33.fchannel ORA_DISK_1: reading from backup piece /disk1/oracle/work/orcva/TKRM/backupset/2007_06_20/o1_mf_nnndf_TAG20070620T105435_29jflwor_.bkpchannel ORA_DISK_1: piece handle=/disk1/oracle/work/orcva/TKRM/backupset/2007_06_20/o1_mf_nnndf_TAG20070620T105435_29jflwor_.bkp tag=TAG20070620T105435channel ORA_DISK_1: restored backup piece 1channel ORA_DISK_1: restore complete, elapsed time: 00:00:01Finished restore at 20-JUN-06RMAN> RECOVER TABLESPACE tbs_3;Starting recover at 20-JUN-06using channel ORA_DISK_1using channel ORA_SBT_TAPE_1starting media recoveryarchived log for thread 1 with sequence 27 is already on disk as file /disk1/oracle/work/orcva/TKRM/archivelog/2007_06_20/o1_mf_1_27_29jjmtc9_.arcarchived log for thread 1 with sequence 28 is already on disk as file /disk1/oracle/work/orcva/TKRM/archivelog/2007_06_20/o1_mf_1_28_29jjnc5x_.arc...channel ORA_DISK_1: starting archived log restore to default destinationchannel ORA_DISK_1: restoring archived logarchived log thread=1 sequence=5channel ORA_DISK_1: restoring archived logarchived log thread=1 sequence=6channel ORA_DISK_1: restoring archived logarchived log thread=1 sequence=7...channel ORA_DISK_1: reading from backup piece /disk1/oracle/work/orcva/TKRM/backupset/2007_06_20/o1_mf_annnn_TAG20070620T113128_29jhr197_.bkpchannel ORA_DISK_1: piece handle=/disk1/oracle/work/orcva/TKRM/backupset/2007_06_20/o1_mf_annnn_TAG20070620T113128_29jhr197_.bkp tag=TAG20070620T113128channel ORA_DISK_1: restored backup piece 1channel ORA_DISK_1: restore complete, elapsed time: 00:00:02archived log file name=/disk1/oracle/work/orcva/TKRM/archivelog/2007_06_20/o1_mf_1_5_29jkdvjq_.arc thread=1 sequence=5channel default: deleting archived log(s)archived log file name=/disk1/oracle/work/orcva/TKRM/archivelog/2007_06_20/o1_mf_1_5_29jkdvjq_.arc RECID=91 STAMP=593611179archived log file name=/disk1/oracle/work/orcva/TKRM/archivelog/2007_06_20/o1_mf_1_6_29jkdvbz_.arc thread=1 sequence=6channel default: deleting archived log(s)...media recovery complete, elapsed time: 00:00:01Finished recover at 20-JUN-06If you are restoring some datafiles to new locations, then execute RESTORE TABLESPACE and RECOVER TABLESPACE in a RUN command. Use the SET NEWNAME to rename datafiles, as described in "Restoring Datafiles to a Nondefault Location".

The following example restores the datafiles in tablespaces tbs_3 to a new location, then performs recovery. Assume that the old datafiles were stored in the /disk1 path and the new ones will be stored in the /disk2 path.

RUN{ # specify the new location for each datafile SET NEWNAME FOR DATAFILE '/disk1/oracle/dbs/tbs_31.f' TO '/disk2/tbs_31.f'; SET NEWNAME FOR DATAFILE '/disk1/oracle/dbs/tbs_32.f' TO '/disk2/tbs_32.f'; SET NEWNAME FOR DATAFILE '/disk1/oracle/dbs/tbs_33.f' TO '/disk2/tbs_33.f'; RESTORE TABLESPACE tbs_3; SWITCH DATAFILE ALL; # update control file with new filenames RECOVER TABLESPACE tbs_3;}

6-Examine the output to see if recovery was successful. If so, bring the recovered tablespace back online.

For example, enter the following command:

SQL "ALTER TABLESPACE tbs_3 ONLINE
Performing Complete Recovery of a Datafile After Switching to a Copy
If you have image copies of the inaccessible datafiles in the flash recovery area, then you can use the SWITCH DATAFILE ... TO COPY command to point the control file at the datafile copy and then use RECOVER to recover lost changes. When the original location can be used again, you can switch datafile back to the original location. Because you do not need to restore backups, this recovery technique takes less time than traditional restore and recovery.

Note:
A SWITCH TABLESPACE ... TO COPY command is also supported for cases when all datafiles in a tablespace are lost and copies of all datafiles exist.
In the basic scenario, the database is open, and some but not all of the datafiles are damaged. During the course of the day, a datafile goes missing due to storage failure. You need to repair this file, but cannot afford the time to do a restore and recovery from a backup. You decide to use a recent image copy backup as the new file, thus eliminating restore timeThis scenario assumes that database trgt has lost datafile
To switch to a datafile copy and perform recovery:

1-Start RMAN and connect to the target database.

For example, enter the following command:

% rmanRMAN> CONNECT SYS/password@trgtRMAN displays the database status when it connects: not started, not mounted, not open (when mounted but not open), or none (database is open).

2-If the database is open, then take the tablespace requiring recovery offline.

For example, enter the following command to take datafile 4 offline:

SQL "ALTER DATABASE DATAFILE 4 OFFLINE";

3-Switch the offline datafile to the latest copy.

For example, enter the following command to point the control file to the latest image copy of datafile 4:

SWITCH DATAFILE 4 TO COPY;
4-Recover the datafile with the RECOVER DATAFILE command.

For example, enter the following command (sample output included):

RECOVER DATAFILE 4;RMAN automatically restores archived redo logs and incremental backups. Because the database uses a flash recovery area, RMAN automatically deletes them after they have been applied.

5-Examine the output to see if recovery was successful. If so, bring the recovered datafile back online.

For example, enter the following command to bring datafile 4 online:

SQL "ALTER DATABASE DATAFILE 4 ONLINE";




http://www.filibeto.org/sun/lib/nonsun/oracle/11.1.0.6.0/B28359_01/backup.111/b28270/rcmcomre.htm

Sunday, April 26, 2009

ICAS4106B Action and complete change requests



Review change requests
1. Receive and document requests for hardware and software changes, utilising a change management system and according to organisational help desk procedures

2. Gather and organise system data relevant to the change requests, using available diagnostic tools

3. Review the proposed changes against current and future business requirements and examine the system data, with work team, in order to select appropriate changes to be carried out

4. Discuss and clarify the selected changes with client
Modify system according to requested changes
1. Develop a plan, with prioritised tasks and contingency arrangements, for modification of the system
2. Undertake the selected system changes according to organisational guidelines and procedures and in accordance with manufacturer recommendations

3. Test the system changes for performance and identify problems

4. Resolve identified problems

5. Revise relevant client and technical documentation to reflect system changes according to organisational standards

6. Notify client of status of change and update change management system, as per organisational help desk procedures

ProjectTrack 2007 - Personal Edition Overview

The Personal Edition of ProjectTrack is targeted to anyone that needs to manage projects in a single user environment.

ProjectTrack compliments applications such as MS Project, but does not replace them. Rather than a planning tool, ProjectTrack is a program to help you execute your plan; saving you time with all the administrative work that surrounds projects.
or example, if you use a spreadsheet or word processor to keep track of action items (to-dos), issues, milestones, etc. You can use ProjectTrack to keep track of all those items from a single location. You can have multiple companies and projects, each one of them with its own set of information. But keeping track of things is not all you can do with ProjectTrack. Most projects generate documents that need to be easily accessible. They can be linked directly to the project, saving time and stress searching. What about looking for a document related to a project that was finished some time ago? With ProjectTrack, the document can remain linked for easy access.
If, during the course of a year, you spend 2 or more hours looking for documents in your computer, ProjectTrack will pay for itself.
The best way to decide if ProjectTrack is right for you is to try it. Download our evaluation version and decide for yourself. This version doesn't have any limitations, but it will remind you to register after 30 days.
Key terms
Hardware: May include but is not limited to workstations, personal computers, modems or other connectivity devices, networks, DSL modems, remote sites, servers
Software: May include but is not limited to commercial, in-house, packaged or customised software
System: May include but is not limited to the hardware and software components that run a computer.
Requirements: May be in reference to the business, system, application, network or people in the organisation.
Client: May include but is not limited to internal departments, external organisations, individual people and employees.
Organisational guidelines: May include but are not limited to personal use of emails and internet access, content of emails, downloading information and accessing particular websites, opening mail with attachments, virus risk, dispute resolution, document procedures and templates, communication methods and financial control mechanisms.
Technical documentation: May include project specifications, reports, help references, technical manuals, training materials and self-paced tutorials, on-line help, user guides, brochures.
Standards: May include ISO/IEC/AS standards, organisational standards, project standards (for further information refer to the Standards Australia website at: www.standards.com.au).
Documentation: May follow ISO/IEC/AS standards, audit trails, naming standards, version control, project management templates and report writing, maintaining equipment inventory; client training and satisfaction reports.
Help desk procedures: May include:· customer contact centre or general contact point that then consults with a supplier or other technician· customer contact centre staffed by technicians capable of solving problems· real-time on-line support· web-based support.

ICAS4022B Determine and plan problem resolution



This unit will present a series of troubleshooting and fault finding methods to help you enhance your chance of success when trying to fix computer problems. Technicians in the workplace are expected to rectify faults quickly, or provide a workaround or solution. You will learn to create a list of possible causes for faults, organise in order of likelihood of each cause and formulate a solution or rectification.
Outcomes for this unit are:\
.Create a list of probable causes
lti(0)disk(0)rdisk(0)partition(1)\winnt=‘Windows 2000 Professional’/fastdetect/MAXMEM=32
.Login Box prompt appears after user presses CTRL + ALT + DEL simultaneously

.User enters required credentials (username, password, domain/preferred server)

.Network server validates user login (credentials are accepted)

.User logged in
An actual graphical representation of this (actual HTA diagram) is shown below.

Activity 5: Cause and Effect Analysis

This is activity will require you to practise developing a Cause and Effect [fishbone] diagram.
Take the sample from the previous activity—A user that attempts to login

Q: Assume that the user was not able to login successfully and develop a fishbone diagram that analyses the possible causes for this user not being able to login
A: One of a possible solution for the fishbone diagram is presented below:

Key terms
Boot-up time faults: Boot-up time faults are those faults that occur during the boot-up sequence.
Cause-and-Effect Diagram: A graphic tool that helps identify, sort, and display possible causes of a problem or quality characteristic. These diagrams sometimes are knows as fishbone diagrams due to their shape.
Cause and Effect Analysis (CEA): Cause and effect is a method which allows a technician to analyse the possible causes of faults (the undesired negative effects). The Cause and Effect method is usually implemented by using Cause and Effect diagrams.

Fault Tree Analysis (FTA): Fault tree analysis is the process of analysing a fault by using a decision tree. Decision trees can be constructed in advance, for common troubleshooting tasks or they can be constructed ad-hoc for new faults.
Hierarchical Task Analysis (HTA): HTA is a logical representation of a process and steps that must occur for this process to begin and finish successfully.
Master Boot Record (MBR): The sector at the beginning of a hard disk that contains bootstrap information, to begin loading an operating system.
POST: POST or Power-On-Self-Test is an initial test that a computer system executes automatically when turned on to check system integrity.
Virtual Memory: Virtual memory is the area of a hard disk drive used to fake memory (RAM). When a system runs out of physical RAM, it relies on available hard disk space to provide working storage.

Sunday, April 5, 2009

ICAD4217B Create technical documentation

There are many reasons for maintaining a complete and up-to-date library of systems and procedures for documentation. Without documentation that has meaning to the users, time may be wasted dealing with technical problems by duplicating answers to problems that have already been solved.

Other reasons for creating accurate, complete technical documentation include to:

. pass an audit, or quality certification
. create an accurate record of an organisation’s systems
. record maintenance
. identify the need to upgrade systems
. provide records for future decisions
. provide workers and stakeholders with a database for their jobs
. ensure work and service quality is consistent when staff changes occur
. add value to the organisation’s business and service.
Technical documentation provides a record of the functionality and processing of a system, program, network or application. The technical documentation should document how the system, program, network or application is structured, how it works and changes that have been made to it.
Task 1: Determine documentation standardsQ: Make a list of ten objects that you can see or feel from where you sit, that have technical documentation associated with them.
Q: Make a list of ten objects that you can see or feel from where you sit, that have technical documentation associated with them.

A: Answers for this question will vary, there are some example following:

1-When you switched on your computer, a technical document (a log in the computer’s memory) was created.
2-The software you are using was installed using technical documentation.
3-When you switch on your lights, a record is kept for billing purposes.
4-The chair you sit on was made from a plan.
5-The mobile phone on your desk has a help function.
6-When the chair was made, a quality check was recorded.
7-The air you breathe is monitored for pollution records.
8-The time on the clock is set to an agreed, international standard.
9-The clothes you wear were made to a pattern.
10Your health is recorded in doctor’s files.
Activity 2: Identify documentation standards

Q: Identify at least two industry standards that relate to documentation. Use search terms such as: standards, documentation, technical, industry in your preferred search engine.
A: International Standards Organisation ISO 9000 Quality Standards (which is a family of different standards) that requires the processes involved in technical documentation to meet a certain level of quality, theses standards concern quality management systems. The Australian Standard AS ISO 10013-2003 relates to the documentation for the quality management system. ISO 14000 standards relate to environmental aspects of processes and can relate to such things as disposal and storage of documents and the media chosen for publishing documents. The ISO 9000 and ISO 14000 families of standards are those from which many organisation-based standards are derived.

There are many standards that can apply to software used by documentation and used in the delivery of documentation. Two groups of specific standards that relate to the design and production of technical documentation are the Australian Standards for Editing Practice produced by the Institute of Professional Editors (IPed), formerly the Council of Australian Societies of Editors (CASE), and the World Wide Web Consortium (W3C) onscreen accessibility guidelines. You may have found others that relate more specifically to your own study or work area.
Task 2: Determine technical documentation requirements
Activity 1: Documentation for programs
Note the following scenario
Your organisation’s software development team has been complying with all the documentation requirements for the development of new programs, except for one issue.
The comments in their code, telling others what they’re trying to do with their program are random, cryptic, and inconsistent.

You are asked to write specifications for comments in programs. The conventions should apply to any of the languages used by the programmers for the organisation. The constraints and rules imposed on programs should be as simple as possible.
Q: What are some specifications that could be used for commenting within a program? Interview someone working in software programming or search the web for some sample specifications
A: The specifications for comments within the code could include that:

.an overall comment should be included at the start of the program to identify the . framework of the program or changes to the program
. comments should be used to describe the code that is not apparent
. all comments should be preceded by a blank line
. arguments should be commented if they are not clear
. comments should be aligned with the code.
Activity 2: Documentation requirements

Q: Think about the last time you purchased something that required installation or that you had to put together yourself. Did it come with instructions? Were the instructions complete, comprehensive, useful, coherent, accurate, accessible and clear? Did they help you or did you not refer to them at all?

A: The answer is depending on the product that i have bougth, if that product was the thing i have been used before. I am ever read or look at the instructions. However, if the product is come with the new technology or i never been use it for long time or that product is quite expensive. I might read through very quick to get some useful information.
Activity 3: The pros and cons of paper
Q: There are probably times when you would use one medium in preference to another. What do you think are the advantages and disadvantages of paper-based documentation as a means of learning about a program or a system?

A: Some of the advantages of paper-based documentation include:

.most people feel comfortable with books—they can write notes in them and they can .read them without a computer
.they have the benefit of using the actual software while following the manual
. paper as a physical medium is easily handled by the user
.novice users, or those who are not computer literate may not be able to use on-line help
.paper-based documentation allows the user to add in their notes and bookmarks
.manuals can be modular to target the needs of various user groups
.paper-based documentation is portable, and production costs are less when compared to some other forms of digital media (DVDs etc)
.paper can sometimes offer greater detail than other media.

Some of the disadvantages of paper-based documentation include:
paper deteriorates physically over time with use
a manual is more difficult to update and provide flexible access methods
it can not include sound or animation
the physical size of a manual can be intimidating, which can put people off
paper documentation must be massive to be able to cater for all the user needs, but individual users will usually only use parts of it
it may cause the user to shift concentration from what they are doing to the manual.

Activity 4: The pros and cons of digital media

Q: What do you think are the advantages and disadvantages of digital or computer-based documentation (other than video) as a means of learning about a program or a system?
A: The advantages of computer-based documentation include that:
.it can be flexible, provide vast amounts of information, and can integrate sound, text and animation
.it can be context-sensitive, providing help directly relevant to the function being used or to the task
.it is of great value in training and in advanced help features, like wizards and cue cards
.it is easy to update and revise, efficient to store, and cheap to distribute
.it can allow interaction
no paper is needed
.it has cheaper packaging (CDs)
immediate reference is possible (you don’t have to search for the manual).
The disadvantages of computer-based documentation include that:

it requires computer literacy
it often requires various plug ins to access files
the computer screen places limitations on use
it may require swapping from the task to the documentation, causing distraction from the task at hand
as video it can take up large amounts of memory and be cumbersome to download.

Activity 5: The pros and cons of video
Q: Describe some and advantages and disadvantages of using video-based documentation to learn about a program or system?

A: The advantages of video-based documentation include that:
.it can provide a rehearsed and thorough demonstration or walk-through of a software application
.it best suited for presenting animation, sound, graphics and ‘real-life’ presentations
.it is good for training and promotion
.learner retention is generally higher than for printed media (it is generally more engaging)
.suitable for groups as well as individuals
.DVDs are inexpensive and easy to distribute (although development costs may be high)
no paper is needed.

The disadvantages of video-based documentation include that:
video requires specialist equipment and personnel to produce; the cost may be high for complex, multimedia material
sequential access—while video is good for demonstrating sequential tasks, it is unsuitable for random access tasks as found for example in reference guides
.it is non-interactive and does not cater for different levels of users
.it can be easy to pirate
.it is expensive to update—a new video must be produced (rather than a new version of a paper of digital print resource)
documentation is less detailed if reliant on video only.

Tuesday, March 31, 2009

ICAD4043A Develop and present a feasibility report

Assessment information

Welcome to the unit Develop and present a feasibility report (ICAD4043A). This unit is about researching and presenting a range of feasible scenarios or solutions for a client's business problem.

In this unit, you’ll do 5 tasks for a fictional manufacturer of small electrical appliances, NewElectrix. These tasks will allow you to demonstrate your skills and knowledge in Developing and presenting a feasibility report.

To do these tasks you’ll need to be able to:

.Analyse data and document client requirements
.Identify alternative solutions
.Examine alternative solutions against project constraints
.Develop and document a feasibility report
.Obtain client sign off on documentation
Task 1: Create a requirements document
Activity 1.1: Data flow diagram

ICAB4225A Automate Processes








Welcome to the Automate Processes (ICAB4225A) blog. This blog will help you understand about programming.

Assessment information

To successfully complete this unit, Automate processes (ICAB4225A) this blog will be shown about automate solutions by using basic scripting processes and application-specific scripting options.

Automating processes is an integral part of contemporary computing; using inbuilt scripting languages is a key part of that. Applications or systems administration personnel need to continually examine options to automate processes, to that way enhance performance.

To successfully complete this unit, this blog will shown how to design and develop algorithms.
Also need to be able to develop an algorithmic statement of a solution for a set process.
Assessment tasks will require you to show you are able to:

.Develop algorithms to represent solution to a given problem
.Describe structures of algorithms
.Design and write script
.Verify and review script
.Document script
Task 1: Identify algorithm structures

Using a web browser, go to the Q-Skills website at: http://www.q-skills.com/flowchrt.html. Look at ISO9004.4. Section A.6.2 which describes four basic symbols to be used in flow charts.
Activity 1.2: Write an algorithm demonstrating sequence
Q: Write an algorithm that will accept two numbers, add them together, multiply by 27 to the total and then display the total

A: This figure is an algorithm that accept and add two number together, then multiply by 27 to the totlal and display the total.


Q: What are the four basic flowchart symbols and what do they represent?

A: Following table is shown the basic flow chart symbols and they represent.

Activity 1.3: Write an algorithm demonstrating selection
Write an algorithm that will accept a test mark between 0 and 100. Display the grade that the student receives based on the table below:
A: The below ficgure shows an algorithm to accept a test mark between 0 and 100 and also display the grade that the student will receives.

Task 2: Apply algorithm structure to give a solution

Activity 2.1: Create an abstract design
Q: Write an algorithm to process the pay information for employees according to the following:

.To process each pay, the operator will input the hours worked and the pay rate.
.Tax of 30% is to be deducted from the gross pay.
.The information to be displayed is the gross pay, tax deducted and the net pay (gross pay minus tax).
.After processing each pay, the operator will be prompted to process another pay. .Ifthe operator types in the character ‘y’ (uppercase or lowercase), another pay is to be processed. Any other response to this prompt will end the program.

A: This is one of the possible solution.
Activity 2.2: Review abstract design
Design a set of inputs that could be used to conduct desk-checking of the algorithm below. The test data should test program flow control, correctness of calculations and assignments to variables. The algorithm should meet the program specifications presented in Activity 1.
Q: Perform a desk-check on the algorithm using your test inputs. Does the algorithm meet the program specifications? If not, what errors did you identify?
A: According to the algorithm in 2.1 answer, This algorithm does not meet program specifications because of two problems:

.Problem 1 — The gross pay is displayed twice and the net pay is not displayed.
.Problem 2 — If the operator responded with uppercase Y when prompted to process another pay, the algorithm stops
The IF and the ELSEIF both test for the lowercase ‘y’. One of them should test for uppercase ‘Y’.

Activity 3.2: Identify and correct a logic error

Task 3: Develop and verify script language for an algorithm
Activity 3.1: Translate an algorithm to script code
Translate the following algorithm into script code using Python. Execute your script with the numbers 3 and 5.

Q: Find and correct the logic error(s) in the script.

A: There are 3 logic error followed:

Logic error 1: In the while loop, the else should not change the loop control variable (gotConvertTo) to 1. This allows any character to be entered from the keyboard and the script continues. This line should be deleted.

Logic error 2: This is more like a ‘copy and paste’ error. The code executes as it should, but the output would be misleading. The print statement in the section where the original temperature is converted to Celsius (the last if), should read Fahrenheit where it reads Celsius. It should be:

if convertTo == 'c':
newTemp = temp—32 * 5/9
print 'Original temperature entered was',temp,'Fahrenheit'

Logic error 3: The mathematical formula to convert to Celsius requires that 32 be subtracted from the temperature BEFORE the multiply and divide. The code should enforce a change in the order in which the calculations would be performed to allow the addition to occur first. The addition part should be in parentheses to force the addition to occur fist as shown

newTemp = (temp—32) * 5/9
Key terms

Algorithm: A procedure or set of steps to accomplish a specific task

Computer program: The embodiment of an algorithm in a computer language, so that it can be executed on a computer

Sequence: The simplest type of flow in algorithm design, where actions are carried out in the stated order; see also ‘selection’ and ‘iteration’

Selection: A flow-pattern in algorithm design, where a choice is made about which action to perform, depending upon a logical condition; the most common selection structure is IF/ELSE; see also ‘sequence’ and ‘iteration’

Iteration: a flow-pattern in algorithm design, also known as looping or repetition; actions are performed over and over again; a loop condition determines when the loop will finish; see also ‘sequence’ and ‘selection’

Pseudocode: A language-neutral representation used to show the logic, structure, and calculations of algorithms

Variable: A container with a name, to hold values during program execution; when a variable is declared in a program, some memory is set aside to hold its value

Software development life cycle (SDLC): A procedural framework for developing computer software and information systems

Top-down design: The development of a program by dividing the original complex task into smaller, less complex tasks, and then applying the same process to each smaller task, until the tasks translate easily into code statements

Desk-check: A code testing process where the code is manually executed

Walk-through: A review of requirements, designs and or code by a group; its purpose is to analyse the programmer’s logic and assumptions

Function:A named section of code that performs a particular task

Array: A collection of data items that can be accessed using a common name and an index

ICAA4041A Determine and confirm client business expectations and needs

Assessment Information To successfully complete this unit, Determine and confirm client business expectations and needs (ICAA4041A), you will need to be able to demonstrate the skills and knowledge required to determine client business requirements and verify the accuracy of the information gathered

To do this you will need to confirm that you have sufficient knowledge of investigation, interview and documentation techniques, and the ability to produce a clear statement of business expectations and needs, including critical business requirements.
Your assessment tasks will require you to show you are able to:

.Determine context of business needs and problem
.Gather information
.Confirm system specifications

1: Define and document business problems practice
In order to find a solution for a client’s business problem, it is necessary to fully define the problem in terms of its system boundaries and scope. Objectives and expected outcomes of a proposed solution must be identified and documented, along with the development methodology which is to be used. This documentation must then be submitted to the appropriate person to ensure that its contents are accurate. The skills and knowledge covered in this learning pack are:
.Identify outcomes
.Develop objectives
.Documentation according to organisational guidelines.
Activity 1: Context diagram
An external consultant has recommended the implementation of enhancements to the university’s student management system. The project brief is:
to add functionality to the StudentPlus management system to allow student enrolments, student attendance and student marks via the intranet’

The project brief also contains a broad list of the functions the system should support. They are:

.Student self enrolment for classes via internet
.Enrolled classes statement
.List of classes for each teacher
.Entry of student marks
.Entry of student attendance
.Results statement for each student
A: This below diagram is shown the context of student and management system to allow student enrolments, student attendance and student marks via the intranet.
Figure 1: Context diagram for student plus management system
2: Identify information gathering techniques

One of the key skills in determining solutions to business problems is making sure that you first know what the problem is.

While this seems an obvious statement, many clients are too close to a problem to be able to give you the information that may be essential to your role in a project. You need to be able to find the information that you require.

This blog will show different techniques that can be used to gather information for a project and will help develop your skills in interviewing and active listening.
Activity 2.1: Identify listening techniques
Scenario A

Customer: I would like to say that the computer I bought from your store keeps breaking down.
Vendor: Well, there must be something you’re doing that is not right. You’ve never used a computer before, have you? Don’t worry, you’re not the only one. I’ll see what’s wrong. I find that my customers who don’t have technical backgrounds always have trouble with their computers
Feedback A: The vendor is attacking the customer as a way of avoiding the issue and shirking his responsibilities. He could, instead, ask the customer to explain what goes wrong with the computer.
Scenario B

Client: The machine we hired from your company has been continually breaking down over the past two weeks.

Manager: What do you mean by ’continually’? Or do you mean ’continuously’? There’s a big difference between the two words. One means non-stop and the other means every now and again. Or do you mean ’constantly’?
Feedback B: The manager is avoiding the issue by ’nit-picking’. He did this to try to embarrass and belittle the customer. He was able to tell from the context exactly what the customer was saying but chose not to listen or respond. He could say: ’Tell me about the last time it broke down. How were you using the machine?’

Activity 2.2: Question types

Q: Name as many different types of questions as you can.
A: Following are a range of question types:
.reflective questions
.strategic questions
.open ended and closed questions
.organising questions
.what-if questions
.probing questions
.sorting and sifting questions
. divergent questions
.clarification questions
.devil’s advocate questions
.planning questions
3: Analyse data and document client requirements
This blog will provide you with the skills and knowledge you need to analyse and document the information that you have gathered about the problem, to identify the requirements of the new system, and to check that this meets the client’s needs.

The blog also includes information on how to analyse and document those requirements to determine the scope and problem or opportunity faced by the business.
Analyse gathered information to identify new system requirements and establish problem specifications.
.Document system requirements and problems.
.Check documentation to ensure it meets client business needs.
.Analyse client requirements to determine project scope, and the problem context oropportunity faced by the business.
.Document the client requirements, project scope, related problems and sources of information.

Activity 3.1: Data flow diagram
Figure 1: Data flow diagram

Q: Which guidelines have not been followed in the above data flow diagram?
A: There are including of:


.Process description must have a verb – appointment diary does not explain what this process does.
.Data flow description must only use a noun – check appointment does not describe the
data that is coming from the data store.
.The data store must have a name
.Appointment confirmation data cannot go from the data store directly to the patient, it must go through a process.
.No data goes into the data store – if nothing goes into it we cannot get anything out of it!
Activity 3.2: Determine client requirements
Q: A spare parts business has identified the ability of customers to order parts online as an added–value requirement. What sort of added value will this provide to the business?
A: There will be many possibilities that you might identify, including:

.Improved customer satisfaction due to the ability to order from home or their business
.Increased productivity due to faster turn around time for the customer and less time required by the spare parts staff to answer phone queries and fill in order forms
.Financial benefits for the business associated with a possible reduction in the number of order entry staff needed
Key terms

System boundaries: Limits of the functionality of a system, showing interaction with other systems.

Development methodology: Standardised method of developing a system.

External Entity: Any system (manual or computerised), or person who interacts with the system being investigated.

Hawthorne Effect: The tendency to improve performance when under observation
Interviewee: The person who is being interviewed

Interviewer: The person who is conducting the interview (ie asking the questions)
JAD: Joint Application Design – a formal structured technique used to gather information in a group.

CASE tool: CASE (Computer Aided Software Engineering) tools are software packages that help to automate software development.

Data dictionary: A data dictionary is a centralised system for defining and storing information about the data and the processes that transform the data in some way.

Levelling: Breaking down a process in a data flow diagram into lower level processes, each with their own data flow diagram

Platform: The type of computer hardware and / or operating system. For example, Wintel; a platform combining Intel x86 compatible hardware and Windows operating system, Lintel; a platform combining Intel x86 compatible hardware and Linux operating system.

ICAA4233A Determine and apply appropriate development methodologies






For most tasks in this unit might undertake more than one way of carrying them out. The method I choose will depend on a variety of factors, but the most important considerations will often be which method will get the job done as quickly and efficiently as possible while ensuring that the result is the best I can achieve. Once I have identified the most appropriate method for the task, I must then make sure that I follow the method to achieve the required outcome. This involves a high level of planning to ensure that all areas have been addressed and close monitoring of the progress of the project so that it will be completed as planned.


This unit (ICAA4233A) will give you the knowledge and skills to determine and apply appropriate development methodologies for an information technology project. You will learn how to do the following:

.Determine and select appropriate methodology for a given activity
.Apply the selected development methodology

1: Determine and select appropriate methodology for a given activity

This blog will help you to determine and select an appropriate development methodology for a specific activity within an information technology environment.

In this topic you will learn how to:

. Determine and define subject activity
. Define the criteria for selection of development methodology
. Review and evaluate a range of traditional and non-traditional system development methodologies
.Select appropriate system methodology to suit the activity.

Determine and select appropriate methodology for a given activities
Activity 1: Knowledge of the client business domain
Visit the Coca-Cola website (http://www2.coca-cola.com/ourcompany/index.html) and read the company’s welcome statement. Does it give you a clear idea of the company’s core business? Which of the business documents mentioned in the reading notes for this section can you find on the site?

A: This welcome statement clearly indicates the goal of manufacturing, marketing and distributing non-alcoholic beverages. There are links to sections such as ‘Our Beliefs’, ‘Our Diversity’, ‘Leadership’ and so on, which would come under the heading of mission statements and strategic goals.

Activity 2—Obtain knowledge of the client business domain

Use the Internet to answer the following questions about the Environment Protection Authority Victoria as an example of a potential client.

Go to the website at http://www.epa.vic.gov.au/, then select About EPA and EPA Organisation chart.
Q 2.1: In which directorate would you find the Community Relations department?
A 2.1: Sustainable development
Q 2.2: Under which department does Regional Support Systems come?
A 2.2: Regional services
Q 2.3: If you wanted to apply for a job with the EPA, to which department would you address your application?
A 2.3: Human Resources
Q 2.4: If you had a complaint about excessive noise at a neighbouring business premises, to which department would you complain?
A 2.4: Atmosphere and Noise
Activity 3—Identify stakeholders
Read the scenario below:

Southern Dental Services is a small dental practice in a regional town. There are two dentists: Pamela Jones and Brian Huang. The practice has four support staff to manage the day-to-day running of the practice: Jane Emerson, who looks after the appointments; Brenda Gale, who handles the accounts; Keith Dickson, who manages the patient details; and Pauline Santoro, who organises the ordering of supplies, etc. Pauline obtains most of the supplies for the clinic from David Andrews, who runs a business selling medical and dental supplies. She orders all the other office-related products from Peter Smith’s business, OfficeStuff. The clinic has five hundred patients on its books, some of whom, like Mrs Mary O’Halloran, have been coming to the clinic since it opened ten years ago.

Q: For each of the people listed here (Peter Smith, Keith Dickson, Mary O’Halloran, Brian Huang, David Andrews, Pauline Santoro), identify which type of stakeholder they represent from the following three choices: supplier, staff or client. Complete the table and check your answers in the Feedback.
A: Following table is shown the identifying stakeholders.

Determine and select methodology quiz
1. Answer TRUE or FALSE:

Q 1.1: An organisational chart gives an overview of staff and the functions of a business.

A 1.1: True

Q 1.2: An incremental methodology is best used for a system that has a clear, fixed set of objectives.

A 1.2: False


Q 2: A mission statement states the main purpose of the organisation and usually incorporates which of the following goals?
A 2: financial, social and/or environmental goals


Q 3: What is a traditional system development methodology?

A 3: Waterfall model


Q 4: Which methodology requires a high level of user involvement throughout the project?

A 4: Rapid application development (RAD)

2: Apply the selected development methodology
Refering to the previous section, you should already know about determining and selecting appropriate methodology for a given activity. This blog will help you to apply the appropriate systems development methodology to an activity.
In this section you will learn how to:

.Create a project plan
.Clearly describe project tasks
.Define suitable project controls
.Estimate task duration and cost
.Sequence tasks
.Estimate resource requirements
.Monitor project flow
.Review and document the project
Apply the selected development methodology activities
Activity 1: Work breakdown structure
Try the top down method and break down the following goal into several tasks and subtasks and develop a simple work breakdown structure (WBS).

Q: Develop a work breakdown structure for the LAN for Urban Wear’s new retail outlet.

A: This table is a possible WBS. Remember that every project manager may approach the tasks differently and this is just a sample for you to try out your WBS skills.

Activity 2: Factors that impact on time estimates
Q: What factors could impact on your time estimate for the installation and configuring of the workstations for the LAN from Activity 1?

A: There are many factors that may impact the installation and configuration of the workstations including delayed delivery of hardware, slippage of task dependencies (for example, if the network has not been configured before installation of workstation stats, it will not be possible to use the disk cloning tool to install the standard operating environment); workers skill level; availability of tools.

Activity 3: Determining the positions required
Your company, Herriard, which has a staff of 600 full time and 200 part time employees, has decided to introduce sales training techniques on their Intranet site. The training course needs a Learning Management System (LMS) which allocates units of work to the staff. Once in the system, the staff can receive automated feedback and trainers can view staff progress through the system. Herriard has decided to get an off-the-shelf product and adapt it to the company’s needs. You have been given the job of managing the project.
Q: List the job roles or positions that you would include in your team.
A: The team could be comprised of the following:
.an instructional designer to design the structure of the site and to train staff
course writers
.a graphic designer to create a shell to reflect corporate identity
.a development team of 1–2 programmers to adapt the off-the-shelf Learner Management System to company needs
.a part-time network engineer
.a part-time server support
Activity 4: Gantt chart
In your notebook, draw a Gantt chart corresponding to the specifications in the table below
Table: Gantt chart specifications
Apply the selected development methodology quiz
Q 1: Which three processes are involved in the development of a project?

A 1: planning, assessing and monitoring


Q 2: Project controls are usually designed to focus on which three major aspects of project measurements?

A 2: monitoring and tracking progress, determining variation from plan, taking corrective action


Q 3: In which phase of a project would you estimate activity duration and resources?

A 3: Planning phase


Q 4: What is the primary goal of a project review?

A 4: to answer questions about the conduct of the project for the benefit of future projects