Describe a solution for each task

Assignment Help Other Subject
Reference no: EM132109770

Question: The Discussion Board (DB) is part of the core of online learning. Classroom discussion in an online environment requires the active participation of students and the instructor to create robust interaction and dialogue. Every student is expected to create an original response to the open-ended DB question as well as engage in dialogue by responding to posts created by others throughout the week. At the end of each unit, DB participation will be assessed based on both level of engagement and the quality of the contribution to the discussion.

At a minimum, each student will be expected to post an original and thoughtful response to the DB question and contribute to the weekly dialogue by responding to at least two other posts from students. The first contribution must be posted before midnight (Central Time) on Friday of each week. Two additional responses are required after Friday of each week. Students are highly encouraged to engage on the Discussion Board early and often, as that is the primary way the university tracks class attendance and participation.

The purpose of the Discussion Board is to allow students to learn through sharing ideas and experiences as they relate to course content and the DB question. Because it is not possible to engage in two-way dialogue after a conversation has ended, no posts to the DB will be accepted after the end of each unit.

System administration involves a large number of tasks that require access to network servers and workstation computers. Scripting is commonly used for many of these tasks to reduce the labor and to also reduce the likelihood of mistakes. Many of the tasks require administrative access to the computers, and security must be maintained. Your IT group is currently working on a plan to automate as much of the administration work as possible using scripts, but they want to ensure that the security of all systems is maintained. You have been asked to investigate the issues surrounding security and the use of scripts in a network environment and report your findings to the IT group.

1. Use the Library and Internet to find information about maintaining security when using scripting for system administration in a network environment.

2. As part of your response to the IT group:

• Identify at least 2 administrative IT tasks where scripting could be used but security would present an issue.

• Describe a solution for each task that will maintain security and still allow a scripted solution for the task. You are not required to write any scripts for this discussion, but you should discuss how the security issues would be resolved if a script was applied to complete the task.

3. Include at least 1 reference to research sources.

4. Cite all references using APA format.

5. Grammar, spelling, punctuation, and format should be correct and professional.

6. Respond to at least 2 other classmates' postings during the week.

Reference no: EM132109770

Questions Cloud

Probabilities-dichotomous events : What is the probability that Jane's eleventh flip will land on heads as well?
Describe the evolution of cryptography : Compare and contrast the characteristics of classic and modern cryptography. (Maximum: Half a Page, double-spaced). Describe the evolution of cryptography.
How much must the corporate bond pay for loren : If Loren is in the 32% tax bracket, how much must the Corporate bond pay for Loren to be indifferent as to which to buys
Evaluate the success of executing on this philosophy : Explain what your key metrics would be to evaluate the success of executing on this philosophy?
Describe a solution for each task : Describe a solution for each task that will maintain security and still allow a scripted solution for the task. You are not required to write any scripts.
The incentive and sorting effects in motivating employees : Explain the difference between the incentive and sorting effects in motivating employees.
What amount of net income should phf report : Pluto Home Finders, Inc. (PHF), a dog placement service, operates in the Midwestern United States. What amount of net income should PHF report
Number of customers paying with credit card : The number of customers paying with credit card is poisson distributed. the mean number of such users per 5-minute interval is 1.5.
Why is it important for an auditor to collect evidence : Why is it important for an auditor to collect evidence? Comment on the advantages and disadvantages of each method. What is best approach to gathering evidence

Reviews

Write a Review

Other Subject Questions & Answers

  Writing a journal on american politics

The extra credit consists of: writing a journal on American Politics/American Public Policy's topics. The task is to read two newspaper/internet article per day, during ten days.

  Utilitarian and eastern views on moral standing

1. What does it mean to be "due moral consideration" and "the subject of a life?" 2. Compare and contrast utilitarian and eastern views on moral standing. 3. What is "intentionality" and what role does it play in moral agency?

  Design a logical and physical topographical layout

Justify and support the relationship between infrastructure and security as it relates to this data-collection and analysis company.

  Define percent strength of each juice in the first solution

In the first solution pour 67mL of juice b and 29mL of juice. What is the percent strength of each juice in the first solution

  Development of public policy

Explain how environmental factors (structural, political, economic, demographic) influence the development of public policy.

  Government accounting perspective

Please give the answer from a government accounting perspective. The question I have is this: What is the journal entry for the following situation?   Please give date of journal entry and give multiple journal entries if applicable for this transact..

  The surface of the insect''s body and penetrate

Insects do not have lungs as we do, nor do they breathe through their mouths. Instead, they have a system of tiny tubes, called tracheae, through which oxygen diffuses into their bodies. The tracheae begin at the surface of the insect's body and pene..

  Usefulness and limitations of beck depression inventory

What is the usefulness and limitations of the Beck Depression Inventory II (BDI-II)?

  An a worthy answer should have a short paragraph dedicated

1.answer the following consider the failures that lead to the cracking of the secret code machine. list and describe

  Develop an opportunity loss table-minimax regret decision

Even though independent gasoline stations have been having a difficult time, Susan Solomon has been thinking about starting her own independent gasoline station. Susan’s problem is to decide how large her station should be.

  Systems theory terminology

Describe a department or unit within a health care organization using systems theory terminology.

  Determine three leadership style strengths

Determine three leadership style strengths and three leadership style weaknesses of each of the selected public leaders. Evaluate the effectiveness of each public leader in terms of each leader's major successes.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd