Which method or methods you think be appropriate for upgrade

Assignment Help Computer Engineering
Reference no: EM133473375

Project Homework: Client Presentation

Your final project will be to design a training presentation to?the client's IT staff.

If you haven't already done:

1. Download the Client Presentation Template to get started.
2. Review the Presentation Resources which may help you get started.

The presentation must meet the following requirements:

1. 11 to 15 slides of writing-to-understand content (text and visuals). Remember, your audience is the IT team within an accounting firm.
2. voice annotation for every slide (excluding the reference slide)
3. at least two references

The presentation can incorporate screenshots from Project 2 along with additional screenshots as needed. Content should include work that needs to go into making the upgrade successful, how to improve security using two or three of the Windows 10 built-in features, and how-to backup and restore Windows 10 data using some of the tools available in Windows 10.

The presentation should address your recommendations for the following items:

I. Version Summary

A. Recommended version of Windows 10 (e.g., Windows 10 Pro, Enterprise, Pro Workstation) and specific reasons for your choice (e.g., security features, technical and business requirements).

II. Installation Methods

A. Explain Windows 10 deployment methods. Which method or methods you think will be appropriate for the upgrade? Consider the hardware specifications outlined in the project scenario.

III. Security Features

A. Windows Security, BitLocker, Defender, Local Security Policy

IV. Backup and Recovery Overview

A. Discuss the importance of backing up and recovery of Windows 10. This can include explaining what types of files and data that can backed up and restored. This should address:

a. the problems encountered when Tetra Shillings Accounting fell victim to a ransomware attack that resulted in the loss of critical data.

b. the concerns that Tetra Shillings Accounting has concerning recovering data that is lost due to deletion, corruption, or media failure.

c. the ability to restore system files and settings without affecting the user's personal files and data.

d. the concerns that the client has about recovering systems that are negatively impacted by an operating system update.

V. Backup and Recovery Tools

A. You will need to explain how to use Windows 10 backup and recovery tools to meet these objectives. Provide a brief overview of each tool and how it can be used to address the company's concerns. Use screenshots to demo how to configure backups that address the firm's need to recover from a ransomware attack and restore the system to a state before a Windows update, driver, or application was installed.

VI. Backup to Recover from Ransomware Attack

A. Describe how to back up and restore individual files using the utilities available in Windows 10. This should provide the client the ability to restore files lost due to ransomware attacks or other potential risks.

VII. Backup and Recover a Restore Point

A. Research how to protect backup data that is stored on the network. Based on your research, you need to present a strategy to protect backup data that is compromised during a ransomware attack. This will most likely require a strategy to store, copy, or move backups to an offsite location. In this slide, you will need to explain the risks of only having only having a single copy of a backup stored on the network. Think about if the client suffers another ransomware attack and the corrupted data cannot be restored because the backups were also compromised during the attack.

Reference no: EM133473375

Questions Cloud

What were the unethical issues occurred stanley milgram : What were the unethical issues that occurred during the Stanley Milgram experiments? List and explain at least two research ethics issues.
How will knowledge of chemistry play into your career role : How will the knowledge of chemistry play into your career role? - What aspect of chemistry do you feel will be the most important moving forward?
Participants displayed range of conflict styles : Throughout this event, the participants displayed a range of conflict styles.
What were the international causes of the great depression : Why did some Americans oppose aid to Great Britain and France at the beginning of World War two? Who were these americans?
Which method or methods you think be appropriate for upgrade : Which method or methods you think will be appropriate for the upgrade? Consider the hardware specifications outlined in the project scenario.
What kinds of issues or topics would you focus on : When developing a project plan extending from your business plan, what kinds of issues or topics would you focus on if you were a project manager? Why?
What is the realist argument about morality and war : What is the realist argument about morality and war, and how does the Melian Dialogue help us understand it?
Which would create less polarization : Describing three approaches that should be adopted in the US. to improve democracy and in the mainstream media which would create less polarization?
What will be law enforcements biggest future challenge : What do you think will be law enforcement's biggest future challenge and why?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd