Find the rest are in the kitchen for the chef''s staff.

Assignment Help Computer Engineering
Reference no: EM1333862

You have been hired by a large restaurant called Habibi's. Habibi's has a small network of 20 client workstations and a Windows Server 2003. Seven of those workstations are inside the restaurant and are used by the table servers to place customer orders. Three of the workstations are used by the owner and the management staff, and the rest are in the kitchen for the chef's staff.

During Phase One of this project, your job is to set up the Windows Server 2003 and train two of the management staff on its operation.

1. Currently there is only one restaurant location. In the near future, Habibi's will open another branch. Explain how you would work with the current management staff to determine how to set up groups now that will enable them to be ready for the future expansion. What natural groupings can you identify, and how would you implement them in terms of domain local, global, and universal groups?

2. The chef is very temperamental, and one of the guarantees that have been made is that only he will have access to the server folders that will contain his secret recipes. Using some or all of the following tools, explain how you would set up access and security on his folders.

-Groups
-User rights
-Attributes
-Permissions

3. The table servers need access to two shared folders that will enable them to place orders from any of the seven workstations available to them. Explain how you would set up security on these folders.

4. The two management staff members need training how to set up shared folders will access permissions and share permission security. Develop a set of instructions to help them understand how to set these up.

Reference no: EM1333862

Questions Cloud

Find the object in the response was last modified : With nonpersistent connections between browser and origin server, it is possible for the single TCP segment to carry two distinct HTTP request messages.
Explain what i need is real life examples between models : Explain What I need is real life examples between those business models and What I need is real life examples between those business models (like amazon v barnes and nobles)
Examine the policy and its application : Examine the policy and its application to both the union and non-union locations and describe how it will be applied in each of those environments
Illustrate what are the three major categories : Illustrate what are the three major categories of expenditures for the federal government. Explain whether or not we should be concerned with net interest outlays and national debt.
Find the rest are in the kitchen for the chef''s staff. : throughout Phase One of this project, your job is to set up the Windows Server 2003 and train two of the management staff on its operation.
Examples of creative intelligence: intuitive, innovative : Examples of the four styles of creative intelligence: innovative, intuitive, imaginative and inspirational.
Explain how sensitive do you think your organization : Explain how sensitive do you think your organization is to economic expansions upswings and contractions.
Contract law in the horse case with ridem : Under what theories can Mr. and Mrs. Greenacre sue Mr. Boy? Will they win? What defenses will he have?
Sirius xm flexible budgeting : Set up the flexible budget at three levels for the income statement. Companies prepare budgets based on absorption and/or variable costing.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Program on different statements

Program on different statements

  Minimum size of instruction

An imaginary computer has the 16 data registers (R0 to R3), 1024 words in memory, and the 16 different instructions (add, subtract, etc.). Explain the minimum size of the instruction in bits.

  Explain to a-company might set up auditing

define to A-Companyy how they might create a security template and some useful settings. What security suggestions do you have to secure communications from Human Resources server to the Payroll server.

  Findout which one is false statement

Findout which one is false statement.

  Which type of network devices would be supported

You have been asked to generate a paper that compares and contrasts guided versus wireless media for inclusion in your company's knowledge database.

  Developing the secure dmz environment

You will require developing a secure DMZ environment in order to accomplish this task. Generate a drawing of this environment utilizing the Power point, and display the following interconnected elements.

  Why do systems deployments or implementations fail

Why do systems deployments or implementations succeed.

  Consider whether there should be a hard

normally , we use normalization techniques a database. using the bowen et al. (2004) article, discuss the disadvantages of normalizing the database to a high degree of normalization.

  Make an html page with a form for client

make a form using JavaScript that collects client body statistics and customer contact information for record keeping and marketing purposes.

  Generate a class named realtorcommission

generate a class named RealtorCommission. Fields include the sale price of a house, the sales commission rate, and the commission. Create two constructors.

  How to set a rule that used by snort to detect an ack scan

How to set a rule that used by snort to detect an ACK scan What do you think Bro can do a better job detecting an ACK scan?

  Write down a select statement that lists the studentid

I have tried there two queries, but I am told that I am not doing something right. Here are the criteria I used to write the queries and my current answers.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd