Explain the gui and command line utilities

Assignment Help Computer Engineering
Reference no: EM1325980

You are in the role of a consultant. Provide a document fitting for your client. Include all the information that your client will find useful. Be sure to respond to the questions posed directly. But remember, as in any consulting engagement, the client may not have asked all the questions so make sure you consider the entire project. Include any assumptions that you make with regard to this project. Use a report-like format. Do not use a Q&A format. Your document length should be 3-5 pages. As always, double space your document and include your references using proper citation techniques

You have been hired by a large restaurant called Habibi's. Habibi's has a small network of 20 client workstations and a Windows Server 2003. Seven of those workstations are inside the restaurant and are used by the table servers to place customer orders. Three of the workstations are used by the owner and the management staff, and the rest are in the kitchen for the chef's staff.

During Phase One of this project, your job is to set up the Windows Server 2003 and train two of the management staff on its operation.

1. Currently there is only one restaurant location. In the near future, Habibi's will open another branch. Explain how you would work with the current management staff to determine how to set up groups now that will enable them to be ready for the future expansion. What natural groupings can you identify, and how would you implement them in terms of domain local, global, and universal groups?

2. The chef is very temperamental, and one of the guarantees that have been made is that only he will have access to the server folders that will contain his secret recipes. Using some or all of the following tools, explain how you would set up access and security on his folders.

o Groups

o User rights

o Attributes

o Permissions

3. The table servers need access to two shared folders that will enable them to place orders from any of the seven workstations available to them. Explain how you would set up security on these folders.

4. The two management staff members need training how to set up shared folders will access permissions and share permission security. Develop a set of instructions to help them understand how to set these up.

PART 2

Describe the GUI and command line utilities that you might use in creating and managing users, assigning them to global groups, assigning the global groups to domain local groups and granting domain local groups permissions, should Habibi's grow to a national chain of restaurants. Try to envision and describe different scenarios where different utilities might be very useful.The deliverable length should be approximately 4-5 paragraphs. The assignment should not be submitted in the form of a Word document. Don't forget to include your references! These references add credibility to your statements and support your statements. Stating information obtained from other sources requires listing the reference. Re-state that information using your own words. Extracted information must be denoted as such using quotes or some other way to give credit to the original author.

Reference no: EM1325980

Questions Cloud

Diversity efforts focus on ethics : Is it ethical to hire a person with a lower test score because he or she seems to be a better personality fit for an organization?
Distinction between contract and tort : When Allen failed to act on the Estelleâ??s complaints, they filed a suit in an Indiana State court against Allen Construction and Allen personally, alleging in part that his individual work on the project was negligent. Can both Allen and his cor..
Illustrate what policy actions have the federal reserve : Illustrate what policy actions have the Federal Reserve taken to confirm that direction.
Describe yahoo, gmail and spam : Describe Yahoo, GMail and SPAM and My Yahoo account gets on average 3500 spam mails a week
Explain the gui and command line utilities : throughout Phase One of this project, your job is to set up the Windows Server 2003 and train two of the management staff on its operation.
Provide an example of how fiscal also monetary policies : Provide an example of how fiscal also monetary policies compliment or work against each other.
Trends in business ethics : In the 1980s and for most of the 1990's, the preponderance of ethical issues in a business setting involved discrimination or harm to the environment.
Role of accounting and ethics in business : What role does accounting play in business operations? How dependent do you think a business is on its accounting department? Why?
Explain why fiscal policy will be either more : Explain why fiscal policy will be either more or less effective in an economy with a large foreign sector.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Powerpoint 2010

Which among the following statement is TRUE regarding the PowerPoint 2010? Provide the answer providing the reson:Any PowerPoint presentation is saved with a .ptt extension after filename.

  Organizational structure in large public sector organization

However, is it possible that in many countries, taller organizational structures are preferred as they allow more checks and balances to be put in place, to inhibit public-sector corruption and other undesirable practices.

  Instruction is executable in one execute cycle

The MIPS ALU (see enclosed figure) is extended to support an instruction "set-on-not-equal-signs". The instruction 'snes $rd, $rs, $rt' is similar to 'slt'. It sets $rd to '1' if sign bit of $rs sign bit of $rt.

  Ip cameras to improve security for devry university

IP cameras to improve security for DeVry University.

  Recommend a removable storage backup

Managers want to be able to print schedules on any printer at any restaurant if traveling and in a motel with a laptop. Please explain what you would have to do to allow managers to do this and how they will reference the printer.

  Write down a recurrence relation

Write down a recurrence relation

  What are all of ip addresses

What are all of IP addresses

  Benefit of web-based computing environment

Web-based applications like e-commerce and e-government exemplify the platform shift from the client/server computing to the Web-based computing so for this essay question.

  Security policy document project

Analyze security requirements and develop a security policy

  Commercialization of business

Whenever it comes time to commercialize an invention, specify the options that are available to an inventor in order to navigate the business side of commercialization.

  Kinds of digital and logical evidence

State some of the kinds of the digital and logical evidence, and special content data investigators may require to gather during an actual cyber-terrorism case.

  Benefits of ansi/tia/eia cabling standards

Discuss about the benefits of the ANSI/TIA/EIA cabling standards in detail and also explain why telecommunications managers must be familiar with them.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd