Explain the gui and command line utilities

Assignment Help Computer Engineering
Reference no: EM1325980

You are in the role of a consultant. Provide a document fitting for your client. Include all the information that your client will find useful. Be sure to respond to the questions posed directly. But remember, as in any consulting engagement, the client may not have asked all the questions so make sure you consider the entire project. Include any assumptions that you make with regard to this project. Use a report-like format. Do not use a Q&A format. Your document length should be 3-5 pages. As always, double space your document and include your references using proper citation techniques

You have been hired by a large restaurant called Habibi's. Habibi's has a small network of 20 client workstations and a Windows Server 2003. Seven of those workstations are inside the restaurant and are used by the table servers to place customer orders. Three of the workstations are used by the owner and the management staff, and the rest are in the kitchen for the chef's staff.

During Phase One of this project, your job is to set up the Windows Server 2003 and train two of the management staff on its operation.

1. Currently there is only one restaurant location. In the near future, Habibi's will open another branch. Explain how you would work with the current management staff to determine how to set up groups now that will enable them to be ready for the future expansion. What natural groupings can you identify, and how would you implement them in terms of domain local, global, and universal groups?

2. The chef is very temperamental, and one of the guarantees that have been made is that only he will have access to the server folders that will contain his secret recipes. Using some or all of the following tools, explain how you would set up access and security on his folders.

o Groups

o User rights

o Attributes

o Permissions

3. The table servers need access to two shared folders that will enable them to place orders from any of the seven workstations available to them. Explain how you would set up security on these folders.

4. The two management staff members need training how to set up shared folders will access permissions and share permission security. Develop a set of instructions to help them understand how to set these up.

PART 2

Describe the GUI and command line utilities that you might use in creating and managing users, assigning them to global groups, assigning the global groups to domain local groups and granting domain local groups permissions, should Habibi's grow to a national chain of restaurants. Try to envision and describe different scenarios where different utilities might be very useful.The deliverable length should be approximately 4-5 paragraphs. The assignment should not be submitted in the form of a Word document. Don't forget to include your references! These references add credibility to your statements and support your statements. Stating information obtained from other sources requires listing the reference. Re-state that information using your own words. Extracted information must be denoted as such using quotes or some other way to give credit to the original author.

Reference no: EM1325980

Questions Cloud

Diversity efforts focus on ethics : Is it ethical to hire a person with a lower test score because he or she seems to be a better personality fit for an organization?
Distinction between contract and tort : When Allen failed to act on the Estelleâ??s complaints, they filed a suit in an Indiana State court against Allen Construction and Allen personally, alleging in part that his individual work on the project was negligent. Can both Allen and his cor..
Illustrate what policy actions have the federal reserve : Illustrate what policy actions have the Federal Reserve taken to confirm that direction.
Describe yahoo, gmail and spam : Describe Yahoo, GMail and SPAM and My Yahoo account gets on average 3500 spam mails a week
Explain the gui and command line utilities : throughout Phase One of this project, your job is to set up the Windows Server 2003 and train two of the management staff on its operation.
Provide an example of how fiscal also monetary policies : Provide an example of how fiscal also monetary policies compliment or work against each other.
Trends in business ethics : In the 1980s and for most of the 1990's, the preponderance of ethical issues in a business setting involved discrimination or harm to the environment.
Role of accounting and ethics in business : What role does accounting play in business operations? How dependent do you think a business is on its accounting department? Why?
Explain why fiscal policy will be either more : Explain why fiscal policy will be either more or less effective in an economy with a large foreign sector.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Generate an er model

Generate an ER model

  Communication diagram and sequence diagram

Why you would generate a communication diagram in place of a sequence diagram? Describe what the arrow which points to an object in the communication diagram implies.

  Factors in selecting suitable data type

Explain the factors in selecting the suitable data type for some value? Which of these is most significant?

  Implementing the program for carrying out the calculation

Write down a program that has a function named presentValue which carry out this calculation. The function must accept the future value, annual interest rate, and number of years as arguments.

  Illustrate the system processed from the viewpoint

Illustrate the system processed from the viewpoint

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Developing a single neural network

The team member A proposes that you must develop a single neural network which may handle all these stocks. However the member B insists that you have to design the five networks (one for each stock).

  Data representation and logic

Representing Text and Numbers, Binary Arithmetic, Interpreting Logical Statements, Logic Puzzle, Binary and Algorithms.

  Evaluating the post fixed expression

Approximate the post fixed expression a) Initialize an empty stack. While there exist more symbols within postfix string { b) If token is an operand, push it onto the stack. If token is an operator

  What are some of the "old thinking" concerns about

Can you think of some disadvantages to telecommuting? What jobs will not be suitable for telecommuting.

  What devices use to get efficient network communication

CNT Books has expanded considerably as you first got network up and running three years ago. It at the present occupies an entire floor in building, and its LAN has full-grown to contain several servers and more than 60 workstations.

  Prove correctness for following

Prove correctness for following

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd