How will dns be accessed by the lsdg systems

Assignment Help Basic Computer Science
Reference no: EM13856396

HACKD, LLC. has a new research and development group - LSDG. All systems in LSDG will run the Linux operating system and will access resources, as well as share resources, with HACKD, LLC.'s Microsoft Active Directory domain. The domain consists of several Windows Server 2012 R2 servers running various services (Microsoft Active Directory, DNS, DHCP, web services, printing and file services).

HACKD, LLC. also has around 500 client operating system desktops/laptops that run Windows 7 and Windows XP. There is a mix of desktop and laptop systems.

Current Desktop/Laptop Configuration for Windows 7: Processor:

Intel Core i3 Second Generation

Memory: 4GB RAM

Hard Drive: 350GB

Network Card: 10/100/1000 Mbps

USB Ports: 4 USB 2.0

Monitor: 20inch LCD

Current Desktop/Laptop Configuration for Windows XP:

Processor: Intel Core 2

Memory: 2GB RAM

Hard Drive: 80GB

Network Card: 10/100 Mbps

USB Ports: 4 USB 2.0

Monitor: 15inch LCD

Your boss wants you to come up with a proposal to replace all Windows XP systems with Linux. You will implement the Linux of your choosing but with ample explanation.

Requirements

The final submission should contain at least 5 to 7 pages' worth of text written by the student (not counting title page, images, diagrams, tables, or quotations that may be used), but may be longer, not to exceed approximately 7 pages' worth of student-supplied text. It must be doublespaced, have 1-inch margins, and use 12-point Times New Roman or 10-point Arial/Helvetica font. A title page is required.

You must address the following in your proposal and may make any assumptions which are not specified:

• Research and justify whether LSDG will use existing computer hardware that is being used with the Windows XP systems, or if new hardware will be required.

• Plan for migration from Windows XP to Linux.

• Determine the hardware to be used and the installation options.

• How will users log onto the systems? Explain.

• How will systems receive IP addresses? Explain.

• How will DNS be accessed by the LSDG systems? Explain.

• Explain how files on the network may be accessed by LSDG.

• Explain how LSDG can securely share files within their group and other selected groups/users in the company.

• How will printing be handled? Explain.

• What are the manpower estimates to complete this project? Explain.

• What, if any, data will be encrypted? Explain

Reference no: EM13856396

Questions Cloud

Disadvantages of a paper- based shipping container : You are going to compare and contrast the advantages and disadvantages of a paper- based shipping container, a wood-based shipping container and a plastic-based shipping container for use as a distribution package
Balance sheets for byron manufacturing : Problem: The balance sheets for Byron manufacturing at December 31, 2012 and 2013 are shown:
Discuss the use of pallets in a shipping system : Discuss the use of pallets in a shipping system. What considerations must be taken when deciding whether or not a pallet is required for a specific shipment of boxes?
Write a report on the ethical issues in merger : You are required to write a report on the ethical issues in merger and takeover in Australia. You need to write 1250 words excluding references,tables and appendices.
How will dns be accessed by the lsdg systems : How will systems receive IP addresses. Explain. How will DNS be accessed by the LSDG systems. Explain. Explain how files on the network may be accessed by LSDG.
Challenges for the improvement of the device : Consider that you are a senior consulting engineer and that you need to explain the topic in a written report to your customer, who is the managing director of a large company, and a commerce or law graduate.
What was the original price of the boat : His bank charged 6% per year compounded monthly and his monthly payments were $400. What was the original price of the boat?
Write about is criminal profiling : The topic you will write about is criminal profiling, Each student should select one item or subject of their choice from the forensic materials covered in this week's class materials, including lectures and/or reading assignment, and write a 1200..
Write an application that computes all of the amicable : The code should be written in Ruby and answers are displayed in the command prompt. Write an application that computes all of the amicable numbers less than the upper bound that is read in using a gets statement.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Based on the severity of a patient''s illness or injuries.

A triage software system that allows doctors to designate the order in which patients should be treated, based on the severity of a patient's illness or injuries.

  Individual traffic light has at least three states (g.y,r)

Consider a traffic light system at a four-way crossroads (two roads intersecting at right angles) with a countdown timer, a crosswalk button, and a speaker that announces it's ok or not ok to walk

  Describe valid advice for naming variables

Which of the given is valid advice for naming variables? To save typing, make most variable names one or two letters. to avoid conflict with names which others are using , utilize unusual or unpronounceable names.

  Describe how these tips are implemented

Describe how these tips are implemented and why these are important.

  Program that determines of a set of rental cars

For this assignment you will write a program that determines which of a set of rental cars the user can rent for a user-specified rental rate.

  The program should not accept quantities

Input Validation: The program should not accept quantities, or wholesale or retail costs, less than 0. The program should not accept dates that the programmer deter- mines are unreasonable.

  Describe a development scenario

Describe a development scenario where an Agile method would not be an appropriate method to use for developing a software system. Cite an example that addresses a specific programming language such as Java, C++, or others.

  Research its management style from its inception until

Microsoft just announced they are laying off 80,000 employees; Youtube was purchased by Google in 2006 and didn't turn a profit until 2010; and JC Penney changed CEOs and marketing strategies twice in a short span in the late 2000s. You need to..

  Describe the data normalization process

Describe the data normalization process including its specific steps. Why is it referred to as a "decomposition process?"

  The progresses report

The progresses report is a chance to highlight and discuss any issues that you are having in meeting the project plans. Discuss any changes to the original proposal and if needed propose a renegotiate plan on what is to be achieved for the project in..

  Best practices for developing a universally usable interface

Best practices for developing a universally usable interface.

  Cybersecurity research papersummary:

Cybersecurity Research PaperSummary: After selecting a topic from the approved list (see below), you will research a cybersecurity incident using news articles, magazine articles (trade press), journal articles, and/or technical reports from governme..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd