Reference no: EM13190885
Identify and describe the processes involved in the management of the services, disk quotas and security of both Windows and UNIX operating systems.
Jason is the administrator of a Windows 2008 network. He manages five Windows 2008 servers, one of which functions as a file server for three departments. Lately, he is faced with two separate problems. First, a research library was just put into the building. It has two computers running Windows 7, and users can log into them while they are doing research. They are automatically connected to a home directory on the server where the users can create documents based on their research findings. However, the users are finding that, when they move from the computers in their offices to the research computers, they have to reset their desktops, and if they create a shortcut on their office computers, they have to create the same shortcut on the research machines. The users are asking for a solution to this problem.
The second issue is one that the users are not complaining about (yet), but that is becoming a problem for Jason. The users' home folders are stored on the file server. He periodically checks storage use and finds that some users are consuming a disproportionate amount of hard drive space on the server. In addition, this space usage is increasing dramatically over time. When he investigates, he finds that many users are downloading quite a large quantity of game demos and pictures, and these items are creating most of the storage consumption.
Jason wants to be able to provide for the ongoing storage needs of the users while enforcing an upper limit on the amount of space any one user can consume. He also wants to be able to separate each department so that if the users in one department consume the maximum amount of space, that will not overrun the free space available to the users in another department. He currently has two hard drives with capacities of 100GB and 200GB, and he would like to allocate 100GB to each department.
Task
- You have been called in to analyze this situation and make recommendations.
- Explain how you would implement a similar scenario using UNIX?
The current yield on the bond
: Assume that a $1,000 bond issued in 2012 pays $100 in interest each year.What is the current yield on the bond?
|
Define methyl salicyate
: If you have .200 mL of methyl salicyate (density=1.184 g/mL)(molar mass=152.15 g/mol) how many moles do you have?
|
Use the exponent rule for division
: A kilobyte is 2^10. A megabyte is 2^20 bytes. How many kilobytes are in a megabyte? Use the exponent rule for division to find your answer and give your answer in exponential form.
|
Find the slope of the path
: eet over a horizontal distance of 456 feet. Find the slope of the path. Round your answer to two decimal places.
|
How you would implement a similar scenario using unix
: You have been called in to analyze this situation and make recommendations and explain how you would implement a similar scenario using UNIX?
|
State its initial value in a first-order reaction
: its initial value in a first-order reaction, what is the rate constant for the reaction in the units min-1?
|
Igneous rocks and granite
: Which of the following statements is false? Igneous rocks: A rock is porphyritic. Which of the following words could not be used to describe it? 1.groundmass
|
At what output is average product maximized
: From the information in the table, calculate marginal and average products. Graph the three functions (put total product on one graph and marginal and average products on another). For what range of output does this function have diminishing marginal..
|
For how many miles did he drive the truck
: Tony rented a truck for one day. There was a base fee of $14.95 , and there was an additional charge of 99 cents for each mile driven. Tony had to pay $147.61 when he returned the truck. For how many miles did he drive the truck?
|