Creating a plan for installing backup software

Assignment Help Management Information Sys
Reference no: EM132294451

ANSWERS THE FOLLOWING EACH QUESTION

1. Creating a plan for installing backup software.

Your phone rings early one morning. A corporation with 500 employees has just discovered none of the backups of their accounting data for the past 6 monthscan be restored.

Although you have never consulted with them, they want you to come to their headquarters immediately and solve their problem. They are using a leading accounting program and about 6 months ago they purchased the best backup program available.

Upon arriving you discover that they never tested their backups by attempting to do a restore. They have purchased new backup software and want you to give them an installation plan for the new backup software. Your installation plan must be unique for this customer. They do not want a generic plan which can be found on the Internet.

a. Write your plan in outline form, using numbered steps.

b. Do not write complete sentences for each step.

c. Each step can be no longer than the width of your Word document (this means you cannot wrap one line into the next).

2. Local area network.

A new customer calls one afternoon. After one year of daily use, they discovered this morning that they are unable to communicate from their 10 workstations to their only server. You arrive on the scene and determine:

a) They are running Windows Server 2012 on the server,

b) Windows 10 on all workstations,

c) Ethernet cabling,

d) and a Cisco switch as their concentrator.

Another consultant, hired in the morning, spent 3 hours re-installing the Windows Server 2012 operating system, but it did not solve their problem. Before attempting to solve their problem, you need to write down the steps you plan to take to restore network communications.

a. Write your plan in outline form, using numbered steps.

b. Do not write complete sentences for each step.

c. Each step can be no longer than the width of your Word document (this means you cannot wrap one line into the next). You may not use a generic plan from an Internet website.

3. Local area network (LAN)

You arrive at the site of a new client and are told they have just one server along with 12 workstations. You ask to see the server. You are escorted to the closet next to the receptionist. Inside the closet you find the server sitting on the floor. The switch also sits on the floor next to the server. The closet is full of people's coats as well as boxes of marketing materials: key chains, refrigerator magnets, and pens imprinted with the company's name.

The client wants a list of recommendations regarding the server and the switch. Your installation plan must be unique for this customer. They do not want a generic plan which can be found on the Internet.

a. Write your plan in outline form, using numbered steps.

b. Do not write complete sentences for each step.

c. Each step can be no longer than the width of your Word document (this means you cannot wrap one line into the next).

4. Uninstall Programs.

Your new client is interested in increasing the security for their workstations. They know the four steps to hardening workstations: a) use malware protection, b) mitigate vulnerabilities, c) disable programs and services not being used, and d) review firewall settings.

Explain to the client how you will determine: a) which programs are running, and b) which programs are not being used although they are running.

a. Write your plan in outline form, using numbered steps.

b. Do not write complete sentences for each step.

c. Each step can be no longer than the width of your Word document (this means you cannot wrap one line into the next).

5. Plan-Do-Check-Act.

Your job at a large corporation is setting up workstations before they are put into employee's offices. Many tasks must be completed including: installing latest updates to Windows 10, installing anti-malware, installing the appropriate software for the person who will be using this PC, and verifying the intended user is able to login. The process has been plagued with errors and numerous mistakes.

Using Deming's quality improvement scheme of Plan - Do - Check - Act, develop a checklist of recommendations for continuous improvement.

a. Write your plan in outline form, using numbered steps.

b. Do not write complete sentences for each step.

c. Each step can be no longer than the width of your Word document (this means you cannot wrap one line into the next).

d. You may not use a generic plan from an Internet website.

Final exam instructions

Instructions

a. You must write in your own words.

b. If you substitute synonyms, you will receive zero points.

c. You may not quote or paraphrase other sources.

d. You may not provide a Reference page.

e. You may not use citations within the text of your answers.

f. You must supply an answer in the format prescribed for each question.

g. You may not exceed the time limit of 60 minutes.

Reference no: EM132294451

Questions Cloud

What can be mined from such an e-mail database : What are the differences between visual data mining and data visualization? Data visualization may suffer from the data abundance problem.
Restructuring a good idea : Is the "One Microsoft" restructuring a good idea? Why or why not?
Identify at what points you think their data is : Identify at what points you think their data is at the highest risk. Consider where the data is when it at rest, in transit, or in use.
Explain the purpose for establishing system baselines : Explain the purpose for establishing system baselines and how often should these baselines be updated?
Creating a plan for installing backup software : Explain to the client how you will determine: a) which programs are running, and b) which programs are not being used although they are running.
General management controls and application controls : SBM4304 - IS Security and Risk Management - Asia Pacific International College - Discuss the ways the organizations in the selected sector can protect
Should these individual be part of the actual backup team : What "rules of engagement" will be issued so that the DCAT will be free to collect data, observe operations, and ask the occasional question.
What is war driving or war flying : What risks and safeguards are associated with wireless communication? What is "war driving" or "war flying"?
Reduce the environmental : Is there anything the organization and/or the manager could do to reduce the environmental (task and general environment, not the physical environment) impact?

Reviews

Write a Review

Management Information Sys Questions & Answers

  What was going on during the situation

To help in your critical thinking process, the Game Plan, located on pages 38-42 in your textbook, consisting of 10 strategies, was created to help assist you in making critical decisions. One of the 10, Keep an Intellectual Journal, will be the m..

  Design and provide the ip scheme for the network

Design a Secure Network using either Visio, Paint, Word, etc showing the All locations.Design and provide the IP Scheme for the network.

  Comparative analysis of the two social networks

Extend the comparative analysis of the two social networks, Jewish Revolt and Kosovo, to the revolution in Egypt. Identify, and comment on, differences, if any

  Differentiate the software concepts of operating system

Differentiate between the software concepts of operating systems, application programs, utility programs, and programming languages

  What is the required rate of return

Tronic Technology - What is the required rate of return (yield) on the preferred stock?

  Research the efficacy of mis and decision-making systems

You need to be sure to review all of the data for accuracy before any decisions are made that will affect the organization. Using the Argosy University online library resources and the Internet, research the efficacy of MIS and decision-making system..

  How many different estimating techniques were discussed

If each estimate is different, how does a project manager decide that one estimate is better than another?

  Reflect upon sustainability from the perception of the cio

Reflect upon sustainability from the perception of the CIO. Explain why sustainability should be an important concept for every CIO to embrace.

  Analyze how software development methodologies can work

Analyze how software development methodologies (such as agile development) can work in tandem with project management for the benefit of both information systems development projects and organizations.

  Estimate the mean and standard deviation

Estimate the mean and standard deviation of the sampling distribution of dissatisfied patients at discharge and at follow - up.

  Determine the information technology or security gaps

Determine the information technology/security gaps and develop a security strategy that includes issues relating to confidentiality, integrity.

  Describe a change pertaining to an it project

Imagine you work as an IT professional for a midsized company. Describe a change (i.e., a change of process, system, technique) pertaining to an IT project

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd