Explain the gui and command line utilities

Assignment Help Computer Engineering
Reference no: EM1325980

You are in the role of a consultant. Provide a document fitting for your client. Include all the information that your client will find useful. Be sure to respond to the questions posed directly. But remember, as in any consulting engagement, the client may not have asked all the questions so make sure you consider the entire project. Include any assumptions that you make with regard to this project. Use a report-like format. Do not use a Q&A format. Your document length should be 3-5 pages. As always, double space your document and include your references using proper citation techniques

You have been hired by a large restaurant called Habibi's. Habibi's has a small network of 20 client workstations and a Windows Server 2003. Seven of those workstations are inside the restaurant and are used by the table servers to place customer orders. Three of the workstations are used by the owner and the management staff, and the rest are in the kitchen for the chef's staff.

During Phase One of this project, your job is to set up the Windows Server 2003 and train two of the management staff on its operation.

1. Currently there is only one restaurant location. In the near future, Habibi's will open another branch. Explain how you would work with the current management staff to determine how to set up groups now that will enable them to be ready for the future expansion. What natural groupings can you identify, and how would you implement them in terms of domain local, global, and universal groups?

2. The chef is very temperamental, and one of the guarantees that have been made is that only he will have access to the server folders that will contain his secret recipes. Using some or all of the following tools, explain how you would set up access and security on his folders.

o Groups

o User rights

o Attributes

o Permissions

3. The table servers need access to two shared folders that will enable them to place orders from any of the seven workstations available to them. Explain how you would set up security on these folders.

4. The two management staff members need training how to set up shared folders will access permissions and share permission security. Develop a set of instructions to help them understand how to set these up.

PART 2

Describe the GUI and command line utilities that you might use in creating and managing users, assigning them to global groups, assigning the global groups to domain local groups and granting domain local groups permissions, should Habibi's grow to a national chain of restaurants. Try to envision and describe different scenarios where different utilities might be very useful.The deliverable length should be approximately 4-5 paragraphs. The assignment should not be submitted in the form of a Word document. Don't forget to include your references! These references add credibility to your statements and support your statements. Stating information obtained from other sources requires listing the reference. Re-state that information using your own words. Extracted information must be denoted as such using quotes or some other way to give credit to the original author.

Reference no: EM1325980

Questions Cloud

Diversity efforts focus on ethics : Is it ethical to hire a person with a lower test score because he or she seems to be a better personality fit for an organization?
Distinction between contract and tort : When Allen failed to act on the Estelleâ??s complaints, they filed a suit in an Indiana State court against Allen Construction and Allen personally, alleging in part that his individual work on the project was negligent. Can both Allen and his cor..
Illustrate what policy actions have the federal reserve : Illustrate what policy actions have the Federal Reserve taken to confirm that direction.
Describe yahoo, gmail and spam : Describe Yahoo, GMail and SPAM and My Yahoo account gets on average 3500 spam mails a week
Explain the gui and command line utilities : throughout Phase One of this project, your job is to set up the Windows Server 2003 and train two of the management staff on its operation.
Provide an example of how fiscal also monetary policies : Provide an example of how fiscal also monetary policies compliment or work against each other.
Trends in business ethics : In the 1980s and for most of the 1990's, the preponderance of ethical issues in a business setting involved discrimination or harm to the environment.
Role of accounting and ethics in business : What role does accounting play in business operations? How dependent do you think a business is on its accounting department? Why?
Explain why fiscal policy will be either more : Explain why fiscal policy will be either more or less effective in an economy with a large foreign sector.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd