Describe the gui and command line utilities

Assignment Help Computer Networking
Reference no: EM13952378

You are in the role of a consultant. Provide a document fitting for your client. Include all the information that your client will find useful. Be sure to respond to the questions posed directly. But remember, as in any consulting engagement, the client may not have asked all the questions so make sure you consider the entire project. Include any assumptions that you make with regard to this project. Use a report-like format. Do not use a Q&A format. Your document length should be 3-5 pages. As always, double space your document and include your references using proper citation techniques

You have been hired by a large restaurant called Habibi's. Habibi's has a small network of 20 client workstations and a Windows Server 2003. Seven of those workstations are inside the restaurant and are used by the table servers to place customer orders. Three of the workstations are used by the owner and the management staff, and the rest are in the kitchen for the chef's staff.

During Phase One of this project, your job is to set up the Windows Server 2003 and train two of the management staff on its operation.

1. Currently there is only one restaurant location. In the near future, Habibi's will open another branch. Explain how you would work with the current management staff to determine how to set up groups now that will enable them to be ready for the future expansion. What natural groupings can you identify, and how would you implement them in terms of domain local, global, and universal groups?

2. The chef is very temperamental, and one of the guarantees that have been made is that only he will have access to the server folders that will contain his secret recipes. Using some or all of the following tools, explain how you would set up access and security on his folders.

o Groups

o User rights

o Attributes

o Permissions

3. The table servers need access to two shared folders that will enable them to place orders from any of the seven workstations available to them. Explain how you would set up security on these folders.

4. The two management staff members need training how to set up shared folders will access permissions and share permission security. Develop a set of instructions to help them understand how to set these up.

PART 2

Describe the GUI and command line utilities that you might use in creating and managing users, assigning them to global groups, assigning the global groups to domain local groups and granting domain local groups permissions, should Habibi's grow to a national chain of restaurants. Try to envision and describe different scenarios where different utilities might be very useful.The deliverable length should be approximately 4-5 paragraphs. The assignment should not be submitted in the form of a Word document.Don't forget to include your references! These references add credibility to your statements and support your statements. Stating information obtained from other sources requires listing the reference. Re-state that information using your own words. Extracted information must be denoted as such using quotes or some other way to give credit to the original author

Reference no: EM13952378

Questions Cloud

Recommend a fault tolerance method : Managers want to be able to print schedules on any printer at any restaurant even if traveling and in a motel with a laptop. Please explain what you would have to do to allow managers to do this and how they would reference the printer
Alexander rocco management : You have observed that Alexander Rocco Corporation uses Alika's Cleaning Company for its janitorial Services. Explain the relevance these items have. What recommendations, if any might you give to Alexander Rocco management
Representatives interest groups rate congressional : Your Congressional Representatives Interest groups rate congressional representatives on the basis of how often the representatives do or do not support the groups' viewpoints. These ratings are easily accessible online, and they are an excellent way..
Describe three ways that distances to stars can be measured : Name an object, not man made , that emits light in pulsars similar to those from a pulsar. Any wavelegnth is okay. Could we detect these pulses if they came from Jupiter? From a nearby star?
Describe the gui and command line utilities : Describe the GUI and command line utilities that you might use in creating and managing users, assigning them to global groups, assigning the global groups to domain local groups and granting domain local groups permissions, should Habibi's grow t..
How might bpr be used in your organization : Discuss why a company would purchase a system rather than build it themselves.
Determine the minimum size for the secondary mirror : Determine the minimum size for the secondary mirror so that it collects all the light from a 200mm diameter mirror operating at f/6 for objects subtending up to 0.5 degrees. What is the focal length of an eyepiece that will give you an exit pupil ..
Nonrenewable resources towards developing : Today, more than any other time in history, there is growing support to move away from nonrenewable resources towards developing renewable resources to meet current and future energy needs. Fossil fuels are nonrenewable resources that continue to ..
Project - prepare a local it security policy : Project: Prepare a Local IT Security Policy- In Project 1, you developed an outline for an enterprise level IT security policy. In this project, you will write an IT security policy which is more limited in scope - a local IT security policy

Reviews

Write a Review

Computer Networking Questions & Answers

  Specify protocol by listing the different messages

Specify your protocol by listing the different messages that will be used by your application layer protocol. You must clearly specify the contents of each message by providing the message structure.

  Outline a new network security design

Utilize the following information to outline a new network security design. Employee breakdown; 2 partners, 28 accountants, 5 administrative assistants, 2 technology specialists, 1 human resources manager.

  What is a vlan trunk and what protocol alternatives exist

the osi reference model divides complex network tasks into 7 manageable subtasks called layers. layer 2 called the data

  What are the different types of security

What is network security, What are the different types of security and how many are there and Compare small and big networks

  Wan technologies and dynamic routing

LAN Extensions: Fiber Modems, Repeaters, Bridges, and Switches When an optical fiber is used to extend a connection to a LAN, what additional devices are needed?

  Describe how using this process improves the network design

Identify the appropriate stakeholders that should be included in developing each section. Describe how using this process improves the network design and user satisfaction

  Servers on a single lan

servers on a single LAN are connected by a number of switches

  Explain the layers of the osi model

Develop a 6- to 8-slide presentation with detailed speaker notes in which you do the following: Explain the layers of the OSI Model and how data flows through the model

  Threat, risk and vulnerability

Threat, Risk and Vulnerability are related to Cybersecurity. Describe these three terms and provide a business case example.

  What is jini technology?

What is JINI technology?

  Explain possible violations of moral rights and of justice

In your judgment, were possible utilitarian benefits of building Caltex plant in 1977 more significant than possible violations of moral rights and of justice which may be involved?

  Classifying the signal

You are provided with some continuous signals for the number of sensors on a sensor array. The signals detect various categories of signals.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd