Difference between sam and active directory, Operating System

Assignment Help:

Question:

(a) Write down short notes on the different versions of Windows server 2003 mentioned

below:

1. Windows Server 2003, Web Edition
2. Windows Server 2003, Standard Edition
3. Windows Server 2003, Enterprise Edition
4. Windows Server 2003, Datacenter Edition.

(b) Write down a short note on the difference between SAM and Active Directory.

(c) Like many operating systems, Windows uses an object-oriented design. A request for a resource ultimately becomes a request for an object. In this environment, an object is an individual attribute and its value that define the object as well as a list of related operations that can be performed on the object. Every component of the Windows operating environment including printers, groups, and server processes cannot be treated as an object. Each object is an independent entity with its own configuration and responsibilities. This is necessary because objects can be shared or accessed by more than one process. The object's identification is a combination of its type and its instance. The object's type is made up of the attributes and services it supports, whereas its instance notes which particular entity of the specific type is being referenced.

Write down how far you are agreeable with this statement.

(d) Write down short notes on each of the following with reference to Active Directory

  • ? Domains
  • ? Organisation Unit
  • ? Sites
  • ? User and Machine Groups
  • ? Group Policies.

 


Related Discussions:- Difference between sam and active directory

What are a safe state and an unsafe state, What are a safe state and an uns...

What are a safe state and an unsafe state? Answer:  A state is safe if the system can allocate resources to every process in some order and still avoid a deadlock. A system is

Protection scheme in unix, Q. Consider a system that holds 5000 users. Pre...

Q. Consider a system that holds 5000 users. Presume that you want to allow 4990 of these users to be able to access one file. a. How would you denote this protection scheme in

Linux, Discuss the risks of having a single root user

Discuss the risks of having a single root user

What advantages are there to this two-level directory, What advantages are ...

What advantages are there to this two-level directory? Users are isolated from each other. Users have more freedom in choosing file names.

What is meant by context switch, What is meant by context switch? Switc...

What is meant by context switch? Switching the CPU to another process needs saving the state of the old process and loading the saved state for the latest process. This task is

Networking protocols, Modern networks are not implemented as a single piece...

Modern networks are not implemented as a single piece of software; that would render the task of dealing with multiple technologies and manufacturers virtually impossible. The solu

What is an effector process, What is an effector process? The effector ...

What is an effector process? The effector process is a method that verifies itself.The effector process exists in particular criteria.

Merits of device controller in the kernel, Q. State three merits of placing...

Q. State three merits of placing functionality in a device controller rather than in the kernel and State three disadvantages. Answer: Three advantages: Bugs are less probabl

Explain deadlock avoidance, Deadlock Avoidance It's a method to evade ...

Deadlock Avoidance It's a method to evade deadlock by careful resource scheduling. This approach to the deadlock problem foresees deadlock before it actually occurs. This a

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd