Operating Systems Practice Quiz Chapter 6 1. The Registry is a database of all configuration setting in window. Why should you avoid directly editing the registry? a. Nothing will happen if you directly edit it b. You can cause severe damage c. You can cause mild damage d. There is no danger 2. ______________________ applets provide a safe way to edit the registry. e. Control panel f. Command Prompt g. POST h. BCD 3. _____________
Words: 700 - Pages: 3
Directory on their computer systems. The first way that they would backup there computer that use the Active Directory is by using a Manual backup. The way that they would go by doing that would be going into the computer and open up the Administrators group or the Backup Operators group to launch a manual backup on their computers in the office. The other that they would backup there computer is by doing a schedule backup. They would have to go through the Administrators group on the computer then
Words: 267 - Pages: 2
guide Final Exam Study Guide This runlevel is textual multi-user mode. This system script contains the default runlevel. A system administrator is manually setting up a new daemon named analyzed. ● The daemon should be set to run at runlevel 3 and be the very last daemon to load. ● The link to start the daemon should be named this. ● These commands would stop the analyzed daemon. ● These commands would tell the system at which runlevels to start analyzed. These commands would let you most safely
Words: 642 - Pages: 3
Khalifah Alcutt Professor Shade 1230 Project 1 As a System Administrator of the Home and Hospice Care Complete Inc., the way I will be designing this client server network for this small business /office would be continuing the use of the Windows server 2008 operating system, the Windows 2008 small business server comes with an antivirus and email protection, monitors levels of all software and applications running, can also manage and maintain any large amount of workload/project used on the
Words: 700 - Pages: 3
“Three Linux Security Tools” Charles Huhn ITT-Technical Institute Abstract: UNIX/Linux operating system have hundreds of security tools out there for protecting valuable information. Out of the many tools on the market, I’ve researched three and wrote about them. The three tools that I’ve research are Nmap, Nessus, and Chkrootkit. In this paper I’ll go over how they enforce security, what threats these tools are designed to eliminate, and what organization is behind the tool. The first
Words: 1070 - Pages: 5
Creative Image Group Infrastructure Upgrade Information Systems Capstone Dr. Richard Borroughs April 21, 2013 History of Creative Image Group The concept of Creative Image Group began in 1992 while two friends were attending college. One was majoring in business with a focus on marketing and advertising; the other sought a degree in graphic design technology. The graphic designer was learning how to take an art form that was originally done with paper, pens, acetate, tape and glue
Words: 1523 - Pages: 7
helpful and needed at LCISD in the networking department. The IT infrastructure is based off a lot of cisco equipment as LCISD is a “Cisco Shop” they use layer 2 and layer 3 switches and use a 6500 switch as their core. The whole phone system is a cisco phone system, and just this year put a Cisco Meraki Access Point in every single classroom at every single school in LCISD. They are meshed so the device just switches seamlessly to the closes point. They do have a windows server that uses VMware to
Words: 460 - Pages: 2
presently does not do any detailed technology budgeting. Not forecasting technology needs can easily create a situation where workers are not providing service as productively as possible and can lead to unexpected spikes in spending as large numbers of systems need replacing or repairing. Due to the amount of hardware, software licenses, and required supplies and services that MOBC has, I recommend that
Words: 2966 - Pages: 12
Microsoft Windows [Version 6.1.7600] Copyright (c) 2009 Microsoft Corporation. All rights reserved. C:\Users\Administrator>icacls.exe ICACLS name /save aclfile [/T] [/C] [/L] [/Q] stores the DACLs for the files and folders that match the name into aclfile for later use with /restore. Note that SACLs, owner, or integrity labels are not saved. ICACLS directory [/substitute SidOld SidNew [...]] /restore aclfile [/C] [/L] [/Q] applies the stored DACLs to files in directory.
Words: 694 - Pages: 3
covering two different ways that a system that can support 5,000 users, specifically a protection scheme in UNIX. Please note that out of these 5,000 users, only 4,990 of those users will have access to a specific file. I will first begin with the explanation of one of the ways that a system can support 5,000 users and then move on to the second way that a system can support 5,000 users. The first way that a system can support 5,000 users is for the administrator or facilitator to set up an access
Words: 654 - Pages: 3