Free Essay

Nt1230 Analyisis 4.1

In: Computers and Technology

Submitted By boombuhm
Words 301
Pages 2
For this proposed scenario I would use just three servers with Windows 2008 R2; a Filing server, an Application server, and a Monitoring & Threat Management server. I feel that Datacenter would be the best option to use as it is more cost efficient and provides reliable support by offering an increased number of processors and increase RAM as well as failover clustering. This also offers key features for power savings, manageability, and helps with allowing workers from remote locations to use and access company resources.
The Filing server will allow us to create files able to be accessed by different people from different locations. We will have increased ease of control over access and permission to these files as well as setting up partitions for allocating resources for saved data properly. Server Message Block (also known as SMB) to access the shared folders. This server can also be used for our printers so that we can set up multiple computers to print to specific printers.
The application server will give us an environment we can use for running server-based business applications for our company. This will allow users to access applications through a web page that is hosted on the server. We can also use this as our mail server by installing Microsoft Exchange. This is a mail server as well as a contact manager program that runs on Windows Server. With this users can get to their email using multiple email clients including the popular Outlook.
Finally the Monitoring & Threat Management server will allow our lead IT guy to manage and monitor the servers. There will be a remote access feature so our IT support can monitor these from different locations. This will allow for a better way to see any type of breaches in security.…...

Similar Documents

Premium Essay

Nt1230 Lab 2

...Ryan Arnold NT1230 1/21/14 Lab 2: Table 2-1 Disk 0 Disk 1 Disk type (basic or dynamic) Basic Basic Total disk size 60.00GB 15.00GB Number and type of partitions 1 Primary 0 Amount of unallocated space 20.00GB 15.00GB Lab 2: Table 2-2 Disk 0 Disk 1 Unallocated space left (in gigabytes) 18.05 GB 15.00 GB Unallocated space left (in megabytes) 18483.2 MB 15360.00 MB Questions 1. What is the number of the 2 GB partition you created earlier in this exercise? It is the second partition listed, Partition 2. 2. Why does the command not execute properly? It does not execute properly because Partition 2 is in FAT32 format, and therefor is not supported. 3. How much available shrink space can be found in the volume? There are 19283 MB, or 19 GB of available shrink space. 4. How is the the resulting volume different from the one you created in Exercise 2.1?......

Words: 443 - Pages: 2

Premium Essay

Nt1230

...NT1230 Fill-in the blank question 1-10 p. 144 Pg 1 Disk Redundancy Research Pg 2 1. By default, Windows 7 standers users are permitted to install Plug and Play devices only if their drivers are digitally signed. 2. The debilitating condition in which files are stored as clusters scattered all over a disk is called fragmentation. 3. The file system included in Windows 7 that is specifically designed for on flash drives called eXfat. 4. Technically speaking, you create partitions on basic disks and volumes on dynamic disks. 5. In windows 7, the Fat32 file system is limited to volumes no larger than 32 GB. 6. The digital signature of a driver consists of a Checksum that is appended to the driver itself before publication. 7. To create a fourth primary partition on a basic disk, you must use the Disk Part utility. 8. To extend or shrink a partition on a basic disk, you must be a member of the Administrators or Backup Operators group. 9. The default partition style used by windows 7 on anx86 computer is MBR. 10. All digital signed drivers have undergone Windows Hardware Quality Lab testing. 1. RAID stands for, Redundant Array of Independent Disks. 2. We would RAID when we need to combining several hard disk drives into one logical unit. 3. A. RAID 0 is stripping it divides the information onto 2 or more hard drives speeding up the input and output of the device, B. RAID 1 is mirroring it provides......

Words: 466 - Pages: 2

Free Essay

Nt1230 Unit 2 Assignment 1

...NT1230 Unit 2 Disk Redundancy 1. RAID stands for Redundant Array of Independent Disks. A way of logically putting multiple disks together into a single array, getting more reliability and faster capabilities. 2. Use RAID if redundancy and reliability are important. If there are problems with your computer RAID will give you more throughputs enabling you to read and write data from multiple drives instead of one. 3. A. RAID 0: Known as stripping. Where data is stored across any number of disks. You can have from two (2) to thirty two (32) physical disks. If one disk fails, all information is lost. There is no redundancy. B. RAID 1: Known as mirroring. Data is written identically across all drives in the array. Used mainly for redundancy. No data will be lost if a drive fails. You must have two (2) disks. C. RAID 5: Data is split over three or more discs, in a way that protects the data if any of the discs fail. Parity is stored on all of the discs in the drive array, which means that if one disc fails, you won't lose all of your information. Reading is faster since the data has more drives to read from. Writing is a downfall due to the fact that the data has to be compared and processed in order to create the parity. Must have 3 disk minimum and from 8 to 16 maximum. D. RAID 6: Is like RAID 5 with the stripping and parity across the array of disks but adds a second set of parity information for each block of data. Level-6 requires a minimum of four......

Words: 488 - Pages: 2

Free Essay

Nt1230 Chapter 9,10,11

...Chapter 9, 10,11 NT1230 Chapter 9, 10, and 11. Chapter 9 Authentication: The process of verifying that the identity of the person operating the computer matches that of the user account the person is using to gain access. Authorization; The process of granting an authorized user a specific degree of access. Active Directory: Permissions are user based. Users Rights: are specific O.S. Tasks, such as shut down or allow log in through terminal services. Local and domain users: They are two completely separate user account systems, which user account system windows uses depends on whether it is a member of a workgroup or an Active directory domain Home Group: is a simplified network paradigm that enables users connected to a home network to share content with permissions. Work Group: is a collection of computers that are all peers. Peer Network: is one in which every computer can function as both server by sharing with other computers, and client by accessing shared resources on other computers. Domain: is a collection of computers that utilize a central directory service for authentication and authorization. Domain controller: A Windows server with AD/DS directly service installed with domain in users administrator’s only to have to create one user account for each person. Workgroup Users: require many different account for one person. Local Groups: can only use local groups Only local users from the same computer can be members of a local group....

Words: 593 - Pages: 3

Premium Essay

Nt1230

...TermPaperWarehouse.com - Free Term Papers, Essays and Research Documents The Research Paper Factory Join Search Browse Saved Papers Home Page » Computers and Technology Future In: Computers and Technology Future Vincent Fernandez April 24, 2013 Mr. Greene NT1230 Lab 5.1 Exercise 5.1.1 Bridges standards which include bridging, spanning tree and others it links many of the other 802 projects. Such as 802.3(Ethernet) 802.11 (Wi-Fi) and 802.1b standards. Exercise 5.1.2 In June 2003, the IEEE approved a standard, IEEE 802.3af, for Power over Ethernet technology. The standard specified a 15.4W maximum power delivery from the network device, also known as power sourcing equipment (PSE), to an end device, also known as a powered device (PD). The average maximum power available to the PD is 12.95W after accounting for cable loss. This expands broader end device coverage such as Cisco IP phone 7941G-GE/7961G-GE/7985G and wireless access points http://www.networkworld.com/details/4681.html 802.3af, also known as Power over Ethernet, defines a way to build Ethernet power-sourcing equipment and powered terminals Exercise 5.1.3 In book Exercise 5.1.4 The numeric prefix before BASE in the Ethernet standards defines the speed of the cable. At the front of each identifier, 10 denote the standard data transfer speed over these media - ten megabits per second. Short for Baseband, this part of the identifier signifies a type of network that...

Words: 560 - Pages: 3

Premium Essay

Nt1230 Lab 5

...LAB 5 NT1230 5.1 5.2 Question 2 The result was “ this page can not displayed” Question 3 Intranet explorer could not open the page. Question 4 Page still could not be open. Question 5 •Make sure the web address http://ip_address is correct. •Look for the page with your search engine. •Refresh the page in a few minutes Question 6 It is important to clean caches before retesting the web server so it does not open the same cache if there was an error Question 7 The firewall was not letting it open till firewall was turned off Question 8 By testing on other sites with the firewall also turned off and on Question 9 You should not leave your firewall off because it protects your pc 5.3 Question 10 We allowed to open port 80 on HTTP Question 11 Port 4444 is not open 5.4 Question 12 (1) Use good anti virus softwares - To prevent computer from Viruses & other attacks. (2) Be aware of Phising & other social engineering tricks Question 13 The action are what differ from social to security Question 14 The rule we applied in exercise 13.3 applies only to Domain type network by default. So this rule allow connection to intranet inside your network only and will block all incoming connections from outside Public, Private. Question 15 The list was sorted by Domain profile rules. Question 16 On Profile page. Unchecking the Domain and Private checkboxes will prevent client access to the intranet website Question 17 The......

Words: 293 - Pages: 2

Premium Essay

Nt1230 Syllabus

...ITT Technical Institute NT1230 Client-Server Networking I Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite or Corerequisite: NT1210 Introduction to Networking or equivalent Course Description: This course introduces operating principles for the client-server based networking systems. Students will examine processes and procedures involving the installation, configuration, maintanence, troublshooting and routine adminstrative tasks of popular desktop operating system(s) for standalone and network client computers, and related aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course...

Words: 1834 - Pages: 8

Premium Essay

Nt1230 Analisis 1.1

...NT1230 The workstations will require Windows 7 Professional to provide the necessary features needed to satisfy the small businesses needs. Reason number one is the need for backing up the workstations data. With Windows 7 Professional you can backup to the local hard drive (HDD), a DVD, or the network. With home editions you can only backup to the local HDD or to a DVD. With Professional workstations can also be scheduled to automatically backup to the server, which cannot be done with the home versions. The second reason is the ability to encrypt important files. With encryption, even if someone were to take your files, they would not be able to view them without the encryption key. The final reason is that you cannot connect to the server without Professional, Enterprise, or Ultimate. Professional and above are the only versions of Windows 7 capable of connecting to a domain server. Professional is the least costly of the editions that will provide the necessary features, therefore the most cost efficient. A clean install using a migration will be required to upgrade. This is because this is the only way to upgrade from Windows XP to Windows 7. This leaves you with two options: migrate your files to Windows 7 from XP using the built in feature or make sure all files are backed up to the server before the installation. With a migration, all user data and preferences are transferred eliminating the need to manually change the settings on each workstation. Needless to say,...

Words: 338 - Pages: 2

Premium Essay

Nt1230

...Chapter 2 NT1230 10/3/2014 1. When was the first major standard describing a structured cabling system released?      c. 1995 2. What doe EIA and TIA stand for?      i. EIA – Electronics Industries Alliance      ii. TIA – Telecommunications Industry Association   3. What are the three parts of the EIA/TIA 568-B standard?      i. EIA/TIA-568-B.1: Commercial Cabling Standard, Master Document      ii. EIA/TIA-568-B.2: Twisted-pair Media      iii. EIA/TIA-568-B.3: Optical Fiber Cabling Standard 4. Identify the six subsystems of a structured cabling system.      i. Building Entrance (Also called (EF) Entrance Facilities)      ii. Equipment Room (ER)      iii. Telecommunications Closet (Also called (TR) Telecommunications Room or (TE) Telecommunications Enclosure)      iv. Backbone Cabling      v. Horizontal Cabling      vi. Work Area 5. Which subsystem does permanent networking cabling within a building belong to?      i. Backbone Cabling 6. What is a cross-connect?      i. Cross-connect – A space where you are going to take one or multiple cables and connect them to one or more cables or equipment. 7. What is the main cross-connect?      i. Main Cross-Connect (MC) – Usually connects two or more buildings and is typically the central telecommunications connection point for a campus or building. It is also called the Main Distribution Frame (MDF) or Main Equipment Room. The MC connects to telco, an ISP, and......

Words: 2096 - Pages: 9

Premium Essay

Nt1230

...NT1230 6/29/15 NT1230 – UNIT 1. EXERCISE 1. UPGRADING TO:   Valerie Bernier, Dentist RE:   Can I upgrade the office? Hello Ms. Bernier, Thank you for writing to me with detailed information about your computer’s operating system configuration. I am assuming that your present operating system (Windows XP) runs on 32-bit (x86) computers. I am also assuming that each of your machines have 16 GB of available hard disk space. From your systems’ configuration, it looks like your machines meet the minimum hardware requirements for an upgrade to Windows 7. For a 32-bit computer, the system needs to have the following configurations to meet the requirements for Windows 7 upgrade: Processor speed : 1 GHz or faster System Memory : 1 GB Available hard disk space : 16 GB Hardware compatibility with Windows 7 : DirectX 9 graphics adapter with WDDM 1.0 or higher driver From the information you have shared with me, it seems like your machines meet almost all the requirements to upgrade your operating system to Windows 7 Professional. With Windows 7 Professional, you will be able to participate in a Windows Server domain, it also allows you to increase your random access memory (RAM) up to 192 GB. Other add-ons that come with Windows 7 Professional are location aware printing, file system encryption, and the ability to back-up to a network location. You should note that you are upgrading from Windows XP to Windows 7 Professional, you may probably experience......

Words: 385 - Pages: 2

Free Essay

Analysis 4.1

...10/27/15 CO2520 Analysis 4.1 People in an individualist culture will see other people and they will ask how they are doing and that individual will more than likely say that they are doing well when in fact they are far from it. They mostly do this because they do not want to burden other people with their own problem. Personally, I have no experience with people from collectivist cultures but I assume that they are much more open with their problem and even expect help from other members of the culture and community. As I was growing up my family has always been there if I needed help or assistance in any way shape or form, my orientation was never a predominant culture value in my family. My family is rather normal than other families I have witnessed. If there is anything wrong I would always try to figure out a situation or a conflict by myself. Because it is my problem and no one else’s, in my opinion it is rude to expect other people to help you out of your own conflict that you created. But if it does come to asking people for help I would always try to compensate them for helping with money or an exchange to help them in a time of need. This does not apply to everyone though there is always someone somewhere that will go the extra mile for anyone and everyone. The connection between these cultures is that they both want people to be happy, just like every culture. One way they see that if you have problem they will overcome it themselves and realize how strong......

Words: 337 - Pages: 2

Free Essay

Nt1230

...Stephanie McFadden NT1230 Unit 8 Assignment 1 The Just Legal Company in Figmont, Nebraska has acquired a new internet address - www.justafigmont.com. They want to set up a DNS server. What would a basic DNS file look like? Describe the file. The DNS or (Domain Name System) names the number mappings on your computer. For example www.justfigmont.com could be the number 160.92.3.6. This is achieved through the DNS. The DNS is a hierarchy. There are a small number of root domain name servers that are responsible for tracking the top level domains and who are under them. The root domain servers between them know about all the people who have name servers that are authoritative for domains under the root. A basic DNS file may look like this: C:\>nslookup Default Server: vnsc-bak.sys.gtei.net Address: 4.2.2.2 > set type=mx > bellcs.com Server: vnsc-bak.sys.gtei.net Address: 4.2.2.2 Non-authoritative answer: bellcs.com MX preference = 0, mail exchanger = bellcs.com bellcs.com nameserver = ns2.server766.net bellcs.com nameserver = ns.server766.net bellcs.com internet address = 66.78.26.7 "Setting up a Basic DNS Server for a Domain." Setting up a Basic DNS Server for a Domain. N.p., n.d. Web. 07 Aug. 2015. "Learn Exchange Server 2000: Setting Up DNS for Internet Access." RSS. N.p., n.d. Web. 07 Aug. 2015. Unit 8 Assignment 2 What benefits do you see in moving an organization to an Active Directory environment? Four Benefits of......

Words: 689 - Pages: 3

Premium Essay

Cobit 4.1

...4.1 Framework Control Objectives Management Guidelines Maturity Models COBIT 4.1 The IT Governance Institute® The IT Governance Institute (ITGITM) (www.itgi.org) was established in 1998 to advance international thinking and standards in directing and controlling an enterprise’s information technology. Effective IT governance helps ensure that IT supports business goals, optimises business investment in IT, and appropriately manages IT-related risks and opportunities. ITGI offers original research, electronic resources and case studies to assist enterprise leaders and boards of directors in their IT governance responsibilities. Disclaimer ITGI (the “Owner”) has designed and created this publication, titled COBIT® 4.1 (the “Work”), primarily as an educational resource for chief information officers (CIOs), senior management, IT management and control professionals. The Owner makes no claim that use of any of the Work will assure a successful outcome. The Work should not be considered inclusive of any proper information, procedures and tests or exclusive of other information, procedures and tests that are reasonably directed to obtaining the same results. In determining the propriety of any specific information, procedure or test, CIOs, senior management, IT management and control professionals should apply their own professional judgement to the specific circumstances presented by the particular systems or IT environment. Disclosure Copyright © 2007 by...

Words: 84132 - Pages: 337

Free Essay

Analysis 4.1

...NT1230 GARRETT FOGLE ANALYSIS 4.1 Mr. Dakrouni Server Analysis When designing a new network for a soil analysis company, many things must be planned in regards to servers and their roles. The information that I have done my planning on says that the employees of the company will be doing soil analysis and mapping the information to a Geographical Information System (GIS) database. The President and vice President want their employees to be able to get email, be able to get shared files, and print to common printer. With this information, I have analyzed their requirements for amount of servers needed, roles to assign to each, and some of the tools required to configure them. To start off, they will need 8 servers to efficiently run their business with 2 being redundant to be available to pick up the workload if one fails. The six main servers will be assigned roles as follows; file services, database server, application server, monitoring server, threat management server, and print services. The file services server allows you to centrally locate files to be accessed by multiple people, making them easier to access, find, and backup. This server will be important to the employees for sharing of data and references to past work. The database server would serve as a......

Words: 692 - Pages: 3

Premium Essay

Usefulness of Cost Volume Profit Analyisi as Amangerial Concept

..."USEFULNESS OF COST VOLUME PROFIT ANALYISI AS AMANGERIAL Concept" By samya Alakhdar , Dr . Moade Shubita , NYIT –AMMAN –JORDAN FALL-2011. Key words :managerial accounting , cost accounting , CVP. o "USEFULNESS OF COST VOLUME PROFIT ANALYISI AS AMANGERIAL CONCEPT" 1  DR.MOADE SHUBITA "USEFULNESS OF COST VOLUME PROFIT ANALYISI AS AMANGERIAL Concept" By samya Alakhdar , Dr . Moade Shubita , NYIT –AMMAN –JORDAN FALL-2011. Key words :managerial accounting , cost accounting , CVP.                      TOPICS TO COVER: ABSTRACT INTRODUCTION PROBLEM ASSUMPTION UNDERLYING CVP ANALYSISI THE CONTRIBUTION MARGIN. CONTRIBUTION MARGIN INCOME STATEMENT DEFINE THE BREAKEVEN POINT WHAT IS THE C.M RATIO. THE IMPORTANCE of UNIT CONTRIBUTION MARGINE DETERMINATI SOME APPLICATIONS OF CM “WHAT IF “ANALYSIS ON OF TARGET INCOME AND TAXES MOS- MARGINE OF SAFETY CHOOSING THE COST STRUCTURE TO DECREASE COST ULTIMATELY DEGREE OF OPERATING LEVERAGE DEGREE OF OPERATING LEVERAGE IMPORTANCE FOR MANAGERS SALES MIX . CASE TO STUDY. LIMITATION OF CVP CONCLOUSION REFERENCES 2  DR.MOADE SHUBITA "USEFULNESS OF COST VOLUME PROFIT ANALYISI AS AMANGERIAL Concept" By samya Alakhdar , Dr . Moade Shubita , NYIT –AMMAN –JORDAN FALL-2011. Key words :managerial accounting , cost accounting , CVP. ABSTRACT: In order to cope with many planning decisions managers use cost volume profit analysis , They find it an extremely useful measurement in a variety of ways . The......

Words: 2473 - Pages: 10