Configure a network printer on tcpip port

Assignment Help Computer Networking
Reference no: EM13725214

The ABC Hospital is upgrading their version of Windows. As part of the upgrade, 100 new computers will be purchased. Your task is to prepare a standard installation and training documentation so that your new trainees can follow the documentation and assist in properly configuring each system. In your documentation you will walk the trainees through the Windows 7 installation process, as well as installing Windows updates, and configuring each system with specific users and groups, a defined folder structure, network address, printers, and group policies. 
Create user, ITStaff, with local administrator privileges. 

Password complexity should be set to a minimum of 8 characters and meet complexity requirements. 
A second user, HospitalStaff, with standard user privileges and the same password complexity. 
The computers will be set to static IP addresses. For the field test, use the specifications below: 
IP Address: 192.168.2.153 
Subnet Mask: 255.255.255.1 
Default Gateway: 192.168.2.1 
DNS Server: 192.168.2.1 

Configure a network printer on TCPIP port 192.168.2.250 with a printer name of Admissions Printer 
Configure a local printer that is shared as Admissions Color InkJet. 
Create the folder structure shown below. 
The hospital needs to display a HIPPA warning reminding employees of patient confidentiality requirements to all employees when they log on. 

Several teams need access to local printers which will be shared among the group. All users will need to access domain printers. 
Finally, prepare a maintenance plan to install Windows updates.

Reference no: EM13725214

Questions Cloud

Improving the lives of the vulnerable : Imagine you are a policymaker or city council member and are actively involved in improving the lives of the vulnerable. Via the first two written assignments, you have already selected one vulnerable population, which is in need of a new program ..
The highest temperature encountered by the ant : The Temperature at a point (x y z) on a metal plate is T(x y)=4x^2-4xy+y^2. An ant on the plate walks around the circle g(x y)=x^2+y^2-25. what is the highest temperature encountered by the ant? I need help setting up the problem.
Describe the policy that andrew jackson employed : Describe the policy that Andrew Jackson employed in his quest for Indian Removal. What problems did his policy encounter? What effects did the removal have on Native Americans?
Disadvantages of using voip : Question: Discuss the advantages and disadvantages of using VOIP and any experience that you have with this protocol.
Configure a network printer on tcpip port : Configure a network printer on TCPIP port 192.168.2.250 with a printer name of Admissions Printer Configure a local printer that is shared as Admissions Color InkJet. Create the folder structure shown below.
Describe the differences between chain stores and franchises : Describe the differences between chain stores and franchises, Why would a producer use wholesalers rather than selling directly to retailers or consumers
Managing health care organizations : The Final Project should demonstrate understanding of the reading assignments, class discussions, your own research and the application of new knowledge. It should utilize previous skills developed in foundational health care courses and apply the..
Find an equation of the line : Find an equation of the line that passes through the point (0,4) and is (a) parallel to and (b) perpendicular to the line 5x+2y=3.
Corporate and individual responses : Identify the Systemic, Corporate and Individual issues relating to the business scenario in your selected company. Were the Systemic, Corporate and Individual responses to the scenario ethical or not, in your view?

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain how to update star topology

How would you recommend the update to Star topology? What updates you would have about network hardware in order to move to 100BaseT?

  Kind of network crimes may use p to p networks

What kind of network crimes may use P2P networks? Find the most challenging crimes that could be based on P2P networks and write a report on how to do forensic investigations on these crimes.

  What is still need to be completed main referencesr

7502ICT - Advanced Networking: Project. In order to keep track of the progress of the project, you will have to submit an interim progress report describing (a) brief overview of the project (b) what work has been completed so far and (c) what is s..

  Describe three advantages of moving your corporate e-mail

1.describe three advantages of moving your corporate e-mail to the cloud. what are three risks involved in moving to

  Data center managers sometimes find that the most

data center managers sometimes find that the most conventional solutions to their data storage problems are not solved

  Aalyze the security mechanisms needed to protect the dms

write a three to four 3-4 page paper in which you analyze the security mechanisms needed to protect the dms systems

  Set up a small network with network

Required to set up a small network with network ID: 210.15.5.96/27. In this network, there are three routers, two servers, one acting as DHCP Server and another as Mail/DNS Server.

  Which of the following best describes https

Name one acceptable form of 802.11 wireless LAN security/encryption AND name one unacceptable form.

  Show that f-function of des is not reversible

Show that F-function of DES is not reversible and explain how a Feistelcipher whose main component is not reversible can actually support decryption.

  Networks 1consider an rtp session consisting of four users

1.consider an rtp session consisting of four users all of which are sending and receiving packets to the same multicast

  How you would implement a similar scenario using unix

You have been called in to analyze this situation and make recommendations and explain how you would implement a similar scenario using UNIX?

  How rdp file includes settings you configured in client

How can you tell from this experience that the RDP file includes the settings you configured in the client before you created the RDP file?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd