Compare each entry to a list of acceptable entries

Assignment Help Management Information Sys
Reference no: EM131523123

One of the major causes of system performance issues is programs that run in the background and are started when the system starts.

These programs are usually installed, so they are started from one of two entries in the system registry:

HKEY_CURRENT_USER/Software/Microsoft/Windows/CurrentVersion/Run
HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/CurrentVersion/Run

As a network administrator, you would like to gather information about these registry entries for all the computers in the network. You have selected Windows PowerShell to write a script for this task. Your plan will result in a document with a script for the tasks involved.

Because there are security issues that prevent executing the scripts on remote computers, the script will be distributed to all users on the network as a download link on the company intranet. For purposes of this exercise, security issues can be ignored, so the script is not required to take security issues into account.

Prepare a document to submit your work:

Use Word.

Title Page

Course number and name

Project name

Student name

Date

Provide well-documented source code for a Windows PowerShell script that will perform the following tasks:

Read the registry entries from both of the locations named in the project description.

Compare each entry to a list of acceptable entries. The acceptable entry list is from a text file named "Acceptable_Reg.txt" that will accompany the script when the script is downloaded.

Produce a text file report that lists all unacceptable registry entries. Save the report using the computer name as the file name.

Reference no: EM131523123

Questions Cloud

Write a code fragment that determines the last character : Write a code fragment that reads 15 floating point values from the user and prints the lowest and the highest value entered.
Probability that the new machine project : What is the probability that the new machine project will meet the firm's NPV hurdle rate?
Determining the significant procurement component : Most projects today have a significant procurement component. In your view, what role should project managers play in procurement within the executing process?
Write a code fragment that prints every other character : Write a method called multiplesOfFive that prints the first 5 multiples of 5 (starting with 5). The method takes no parameters and doesn't return anything.
Compare each entry to a list of acceptable entries : One of the major causes of system performance issues is programs that run in the background and are started when the system starts.
Research on qualitative risk analysis : Perform Internet research on qualitative risk analysis. Find and review three sources, along with the assignment readings DOD, Kerzner, PMBOK and Pritchard.
Write a method called average : Write a method called sumRange that accepts two integer parameters that represent a range. Issue an error message and return zero if the second parameter.
Briefly discuss what six sigma means to you : 1. Briefly discuss what six sigma means to you 2. Do you believe six sigma would benefit your company in improved efficiency? If so, please give examples.
Describe the techniques and tools that can be utilized : Describe the techniques and tools that can be utilized to manage the data. Include at least 2 effective techniques and 3 effective tools.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Research a company that uses supply chain management

Research a company that uses supply chain management (SCM) and look at how their organizational profitability is affected by it. Research a company that uses supply chain management. Be sure to review your lessons and assigned readings.

  Explain the use of transaction processing systems

Explain the use of transaction processing systems (TPS) and their link with executive information systems (EIS) in an organisation of your choice in your degree

  What are some types and some phases that can require

As we look at the SDLC, what are some types and some phases that can require a more deft touch when it comes to proper management?

  Supply chain strategy presentation for mcc

Supply chain strategy presentation for MCC - Explain at least 2 growing uncertainties that exist in supply chain management and Provide at least 3 recommendations, for Alex and Joe, for improving their company's supply chain information flow.

  What is business process management

Write a one-page (250-word) paper explaining how organizations use business process management (BPM). Be sure to use at least one specific example from the CSU Online Library, and address the following in your paper: What is business process manageme..

  Explanation of the use of technologiesidentify one form of

explanation of the use of technologiesidentify one form of technology that you have been using frequently for at least

  Discussion of the registered traveler program

Provide a discussion of the Registered Traveler program. Be sure to include a discussion of the technology as well as the impact for airports and airlines. How do Centralized Communication Centers improve airport efficiency

  Detailed information on a company that outsources their crm

Detailed information on a company that manages their own CRM "in house." What are the advantages and disadvantages of this company managing their own CRM in house?

  Analyze three specific potential malicious attacks

The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first tasks with the org..

  Select a business or organization that has particular inform

Select a business or organization that has particular information security needs (i.e. FBI, U of M Medical Center, University of California, etc.).  Write an essay defining the information security strategy and policy for the business or organization..

  Communicate with a relational database

SQL Joins and Typical Query Usage - Communicate with a relational database to create tables, and query and manipulate data.

  Develop security policies all company personnel trained

BIS/221- Students will research risks and threats to digital data and develop security policies all company personnel must be trained on and be held accountable to protect company data.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd