Question 1a give three technical merits of unixb

Assignment Help Operating System
Reference no: EM13348590

Question 1

a) Give three technical merits of UNIX.

b) Differentiate between "clustered systems" and "real-time systems".

c) Describe the purpose of using "trust relationship"

d) What is an object with respect to windows server 2003?

e) Explain how trees differ to forests, and how they are also related.

Question 2

a) The domain name system is made up of three main components. State and describe each component.

b) Describe the two types of queries used in resolving FQDN.

c) Explain briefly three benefits of using "Domains" in the Active Directory.

Question 3

a) Give three guidelines which can be used to decide whether to use domains or organization units.

b) Describe the three main choices in naming a domain.

c) Differentiate between "Global Groups" and "Local Groups".

Question 4

a) Distinguish between the "Group Policy Container" and the "Group Policy Template".

b) When a server is being brought down for service or crashes, there are five operations master which need to be transferred. Describe any of these three operations master.

Question 5

a) Briefly describe the following terms, found in the event viewer.

i) Application log

ii) Security log

iii) DNS Server

b) Give two examples which an administrator can perform when using "Group Policy"

c) One strategy for controlling access to network resources on an NTFS partition is to share folders with the default shared folder permissions, and then to control access to these folders by granting NTFS permissions. Give the three rules which apply when shared folder permissions on an NTFS volume is granted.

d) Give one advantage of using Group Policy Scope.

Reference no: EM13348590

Questions Cloud

Questionconsider a very simple symmetric block encryption : questionconsider a very simple symmetric block encryption algorithm in which 32-bits blocks of plaintext are encrypted
Questionyou have been assigned task of computing the sum of : questionyou have been assigned task of computing the sum of 1000 four-digit numbers as rapidly as possible. you hold in
Questionclark sells an office building in the current year : questionclark sells an office building in the current year for 600000. the building was purchased in 1981 for 350000
Questionfor this project you will create a simplify credit : questionfor this project you will create a simplify credit card transaction management program.name your project
Question 1a give three technical merits of unixb : question 1a give three technical merits of unix.b differentiate between clustered systems and real-time systems.c
Questionsimpson brothers manufacturing company has been : questionsimpson brothers manufacturing company has been starting a traditional overhead allocation method to allocate
Questionin a given heath information management department : questionin a given heath information management department or facility use worksheet to do following-1.classify all the
Question1 prepare a tax research memorandum to convey your : question1. prepare a tax research memorandum to convey your conclusions.2. the memorandum has to be in proper form- a
Question 1a one major problem about process synchronization : question 1a one major problem about process synchronization is called race condition. explain what race condition is

Reviews

Write a Review

Operating System Questions & Answers

  Information technology security

Assume you are an independent consultant who specializes in IT security issues. You have been retained through the Designer Distributions corporation, a mid-sized and growing customer goods distribution corporation.

  Website migration project

Evaluate alternatives to the company self-hosting the site and build a Gantt chart using Microsoft Project or equivalent software, showing all tasks associated with implementing the Website.

  Differences in windows, mac os, unix, and linux os

Discuss the fundamental differences in Windows, Mac OS, UNIX, and Linux operating systems for personal computers? Determine the unique characteristics do mainframe operating systems have?

  Analyse the different methods for collecting data

Analyse the different methods for collecting data Explain by taking examples 3 types of Sampling techniques.

  Protecting the company data

Suppose you work for a small, one office loan business. Your data is critical, and a fire or other disaster could destroy all of your computer documents.

  Focuses on software development process and life cycle model

Discuss how would you address this certification issue with your hypothetical firm for your system that you are trying to certify at the top secret level?

  Discuss how soap related to xml and http

Discuss how is SOAP related to XML and HTTP? Suppose that your readers are familiar with browsing the internet, but they have no technical knowledge of how its works behind scene.

  Find total memory bytes stored in the cache

Following, a byte addressable main memory of 2^16 bytes and block size of eight bytes, using direct mapped cache consisting of thirty-two lines.

  Wireless encryption standards

Compare the several wireless encryption standards. Determine the purpose of implementing wireless encryption and discuss the benefits of each standard?

  Delete all sub-directories within

Delete all sub-directories within "temp" directory if not empty. In Python program change the current working directory to [temp].

  You have poisson arrivals into your system

You have Poisson arrivals into your system with ?= 5 packets/second. The slot length is 1 second. Your current estimate for n^ is 20 (for the k-th time slot iteration).

  Design and programming

Use the semaphore methods to control the concurrency of the solution

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd