Implement Maintenance Procedure LO3
Implement Maintenance Procedure LO3
Service
Level II
Learning Guide 35
Unit of Implement Maintenance
Competence: Procedure
Module Title: Implementing Maintenance
Procedure
LG Code: ICT ITS2 LO3-LG-35
A warranty describes the conditions under, and period during, which the producer or
vendor will repair, replace, or other compensate for, the defective item without cost to
the buyer or user. Often it also delineates the rights and obligations of both parties in
case of a claim or dispute.
Unlike conditions (the central points), warranties are deemed incidental points, and a
breach of warranty is usually not a valid reason for voiding a contract but it entitles
the aggrieved party to damages. See also in nominate term and intermediate term.
Insurance: Written pledge by the insured party that a specified condition exists or
does not exist. Breach of warranty entitles the insurer to treat the insurance contract
as void even if the actual loss is unaffected by the breach. See also representation.
ICT equipment companies guarantees that all the products undergo backbreaking
quality control testing before delivery and installation. In the event that any product of
these manufacturers is found to be defective, the company will provide service for
product repair and/or component replacement as may be necessary within the
warranty period as per the terms mentioned here under.
If your soft ware is integrated in a large system, you may reference a document that
describes this system.
The hardware resources it uses, for example: average RAM usage, peak RAM usage
and peak frequency and duration, disk space for permanent data, disk space for
cache data, average CPU usage, peak CPU usage and peak frequency and duration
…
o Software SOUP
If you use SOUP (Software of Unknown Provenance), list them here.
For each SOUP, describe:
- Its identification and version
- Its purpose
- Where it comes from: manufacturer, vendor, university …
- Whether it is maintained by a third party or not
If this is an executable,
- What are the hardware / software resources it uses
- Whether it is insulated in the architecture and why
- Its interfaces and data flows
- Which SOUP functions the software uses
- How the SOUP is integrated in the software
- What hardware/software resources it requires for proper use
If there is a list of known bugs on your COTS, you may add here this list with a
review of their consequences in terms of software failure and patient safety. If
there are concerns about known bugs, they should be treated by the risk
analysis process.
Workflow / Sequence 1
Describe here the workflow / sequence of a main function
For example, the user queries data, what happens, from his terminal to the
database.
Workflow / Sequence 2
Repeat the pattern for each main function of the system
Computer hardware
This is the physical technology that works with information. Hardware can be as small
as a smart phone that fits in a pocket or as large as a supercomputer that fills a
building. Hardware also includes the peripheral devices that work with computers,
such as keyboards, external disk drives, and routers. With the rise of the Internet of
things, in which anything from home appliances to cars to clothes will be able to
receive and transmit data, sensors that interact with computers are permeating the
human environment.
Computer software
The hardware needs to know what to do, and that is the role of software. Software
can be divided into two types: system software and application software. The primary
piece of system software is the operating system, such as Windows or iOS, which
manages the hardware’s operation. Application software is designed for specific
tasks, such as handling a spreadsheet, creating a document, or designing
a Web page.
Telecommunications
This component connects the hardware together to form a network. Connections can
be through wires, such as Ethernet cables or fiber optics, or wireless, such as
through Wi-Fi. A network can be designed to tie together computers in a specific
area, such as an office or a school, through a local area network (LAN). If computers
are more dispersed, the network is called a wide area network (WAN).
The Internet itself can be considered a network of network
Compiled by Ayele. T Page 7