Premium Essay

Network Admin

In: Computers and Technology

Submitted By nightspell79564
Words 457
Pages 2
Juan J. Morales
Network Infrastructure
Professor Lambert
DB – 2

1 - Explain the concept of a server role in detail. List some of the available server roles, and demonstrate how to configure them. Follow this by a demonstration of adding Windows Server 2008 features how do these features benefit and administrator?
A server role is a software program included in a server software that performs a specific function, some of this server roles are as follows. * DNS Server – Provide the IP name resolution to a network * DHCP Server - Provides an Internet Protocol (IP) host with its IP address and other related and configuration information such as the subnet mask and default gateway. Just to name a few.
From server manager in the left-hand pane, double-click the Roles node. In the right-hand pane, click add role, and click next to bypass the welcome screen. The add roles wizard windows appears, select the role and click next follow the prompts for the selected role to be install.
It makes the management of the server more manageable and integrity of the network. 2 - The installation of Windows Server 2008 can be done in many different methods, list and explain each method in detail. Follow this by stepping through the actual process of this installation of those methods?
Minimum Requirement for Installing Windows 2008
Processor
1.4GB – 64 – Bit
Rams
Minimum 512 MB, Maximum 32 GB
Hard disk Requirement
Minimum: 32 GB 1. Insert a bootable Windows Server 2008 Media and power the physical or virtual server. 2. Opening Installation screen you are prompt to configure the language, date and time, and keyboard. 3. Click next, follow by install now. 4. Next screen you will be ask to enter the Windows Key Product. 5. Next you will be prompt to either enter full install standard edition Gui, Enterprise GUI edition, Core standard, or…...

Similar Documents

Free Essay

Admin Guide

...first line of the file). A field can be enclosed in double-quotation marks (“). This allows you to enter information that has a comma or double-quotation marks in it. Example: if a User Title is Inside Sales, NE you would type “Inside Sales, NE” in the User Title field. • • Tip: If you are using Microsoft® Excel® to create your file, you only need to enter the User Name, User Email and User Title in different columns and save the file as a CSV file. You do not need to add commas or double-quotation marks in the columns; Excel will automatically do this when you save the file. 2. On the Manage Users page, click New/CSV. 3. Select the CSV file you want to upload by clicking the Browse button, locating the file on your computer or network and clicking Open. 4. Click Submit. The file upload begins. A Submission ID is created and shown in the SubmissionID field. The status of the upload is also shown. Click Refresh to update the status of the upload. The system makes two passes through the CSV data. The first pass is an error scan. If there is an error in the file, the system displays a message with the problem line and the error reason. The second pass, which only occurs if the first pass did not detect any errors, adds the new users and checks for redundancy. Copyright © 2009-2012 DocuSign, Inc. All rights reserved. Account Administration Reference Guide 7 An activation email is sent to the new users in the uploaded file. Note: An access code cannot be added......

Words: 8797 - Pages: 36

Premium Essay

Business Admin

...which would it be and why? 10. Why is Charles Babbage known as the “father of computers”? 11. What is the IP Address of the computer you are using and how did you find that out? 12. What is “dogpile” and how does it differ from a search engine like google or ask? 13. A friend is thinking about buying a Lenovo Thinkpad x61. Find and read recent reviews online. What are the pros and cons of this computer system? 14 Someone suggested that you should “overclock” your CPU. What does that mean and what are the pros and cons of doing this? 15. What is Virtual Network Computing and where was it invented? 16. It seems silly, but a friend wants a “USB mug warmer” for Christmas. Where can you find one for sale and how much does it cost? 17. How do “scanners” work? 18. What is currently the world’s fastest computer? 19. What is the National LambdaRail and how does it compare to the Abilene Network? 20. Define the following terms: a. Computer Bus b. SATA c. Firewire d. BIOS...

Words: 792 - Pages: 4

Premium Essay

Network Systems Admin. (in Training)

...Address Class Historical Significance of the address classes: Class A: the first of the address classes, which is responsible for the value ranges of IP from 0-126 and also has 16,177,214 hosts. It also has 256 networks and the most significant bits are 0000. Class B: The second of the address classes, which is responsible for the value ranges of IP from 128-191. It also has 65,534 hosts and 65,536 networks. The most significant bits are 1000 and it is also a common class among most IP addresses. Class C: the third of the address classes, which is responsible for the value ranges of IP from 192-223 the most significant bits are 1100. It only has 254 hosts but it also has 16,177,216 networks since a lot of people have their IP addresses starting with 192.xxx.xxx.xx. Class D: the fourth of the address classes, which is responsible for the value ranges of IP from 224-239. Its most significant bits are 1110, and it does not have any networks or hosts because this class is rarely considered since the start of IP addresses don’t often start with 224 and above. Class E: the fifth of the address classes, which is responsible for the value ranges of IP from 240 and above. The significant bits of this class are 1111 and just as Class D does not have any hosts or networks, the same is with this class since IP addresses do not go above 192 usually. http://www.inetdaemon.com/tutorials/internet/ip/addresses/classful.shtml Address space A: the value range is from 0-126 so that......

Words: 639 - Pages: 3

Premium Essay

Business Admin

...Technologies Engineering Ltd (ST Engineering) is an integrated engineering group providing solutions and services in the aerospace, electronics, land systems and marine sectors. It has more than 100 subsidiaries in 24 countries and 42 cities worldwide. In 2001, the group adopted an integrated approach to business excellence. Their efforts were recognised when ST Engineering won the Singapore Quality Award in 2002 and the Innovation Excellence Award in 2003. In 2007, they became one of two recipients of the inaugural Singapore Quality Award with Special Commendation. TNT Express Worldwide (S) Pte Ltd TNT in Singapore is part of a global transportation and distribution industry, dedicated to providing delivery solutions to customers. Its global network serves more than 200 countries and employs around 152,000 people. Its employees have to work closely and maintain high standards so that parcels and freight are delivered safely and on time. To attain high standards, TNT embraced the business excellence framework, and was rewarded with Singapore Quality Class certification in 2002 and 2005, and the People Developer certification in 2003. In 2009, TNT became one of the first few organisations to achieve the Singapore Quality Class – Star. Case Study Organisations Conrad Centennial Singapore (Conrad) Conrad is a luxury business hotel located in the heart of Singapore’s liveliest and largest business, historical, cultural and shopping districts of Marina Bay, Millenia Walk and......

Words: 14120 - Pages: 57

Premium Essay

Admin

...50. Reaching the Unreached• Children in conflict with the Law• Children in Areas of Conflict/Disaster• Children with Disabilities• Street Children, Out-of-School Children & Youth• Children & Youth in IP Communities The State of Basic Education: Gaining Ground | March 28, 2012 | The Tower Club, Makati City * 51. ICTComputerization ProgramDepEd in EducationDepeD Internet Connectivity Program P1.8 B FY 2012 1,500 laptops 7,000 internet connection 3,700 PC packages The State of Basic Education: Gaining Ground | March 28, 2012 | The Tower Club, Makati City * 52. ICTComputerization Program | DepeD Internet Connectivity ProgramDepEd in Education7,274 public high 10 networked PCs 1 server PCschools 1 printer428 no computer lab 1 network switch3,107 for connection 1 modem 38,251 public 1 interactive whiteboard 1 PC as shared computing elementary schools server 1,716 w/ e-Classroom 7 thin client PCs packages 1 printer 1 LCD projector 1 modem The State of Basic Education: Gaining Ground | March 28, 2012 | The Tower Club, Makati City * 53. ICT Initiatives• Unified Information System• Basic Education Information System• Human Resource Information System• Learner Information System• Asset Management System Web Central The State of Basic Education: Gaining Ground | March 28, 2012 | The Tower Club, Makati City * 54. ICT Initiatives• Learning Resource Management Development System• Geographical Information System and School Mapping• Unified Web Interface Web Central......

Words: 6634 - Pages: 27

Free Essay

Network System Admin

...circuit-switching network is the telephone system, which links together wire segments to create a single unbroken line for each telephone call. Packet switching: Refers to protocols in which messages are divided into packets before they are sent. Each packet is then transmitted individually and can even follow different routes to its destination. Leased line: A permanent telephone connection between two points set up by a telecommunications common carrier. Typically, leased lines are used by businesses to connect geographically distant offices. Time-division multiplexing:  a type of multiplexing that combines data streams by assigning each stream a different time slot in a set. TDM repeatedly transmits a fixed sequence of time slots over a single transmission channel. T-carrier system: the name of the combination of different physical line standards(DSO, DSI, DS3 and others), plus circuits switches that use time division multiplexing (TDM) features, that together allowed the phone company to create digital circuits from end to end and create leased line services for customers. DSO: Digital Signal level 0. One of the physical line standards in the T-carrier system, as originally created by the companies of bell system in the united states. DSO runs at 64 Kbps DS1: same as above DS1 runs runs at 1.544 Mbps, with a 193-bit frame, 24 DSO channels, and an 8-Kbps overhead channel. Frame Relay: A packet-switching protocol for connecting devices on a Wide Area Network (WAN).......

Words: 335 - Pages: 2

Free Essay

Admin Control

...increase the overall security, by reducing the attack surface that is available. One of the most vulnerable settings that can be granted to a user is local administrative access. By adding the user account to the local Administrators group, the user is granted ultimate control over their desktop. The user can perform almost any action, even if the network is configured to deny this access. Actions that a user can perform, due to them having local administrative access, include, but are not limited to, the following: remove their computer from the domain, modify any registry setting. modify permissions on any folder or file, modify any system setting, including settings that are in files in the System folder, install any application, uninstall applications, security patches, or service packs, access any website allowed by firewall, and download and install ActiveX controls, Web applications, or other malicious applications downloaded from the Internet. Although there is a need to have users running as administrator to allow certain applications to function, this type of access is very hazardous and endangers the desktop and the entire network to potential security breaches and attacks. It is essential that the local Administrator password is also reset. This is due to the fact that the user may have had administrative privileges before removing them from the local Administrators group, therefore they could have reset the Administrator account password to something they......

Words: 333 - Pages: 2

Premium Essay

System Admin

...system administrator? * A system administrator (SA) is responsible for managing and maintaining a multiuser computing environment. * He /she looks after computers, networks, and the people who use them. * May look after hardware, operating systems, software, configurations, applications, or security. * A system administrator influences how effectively other people can or do use their computers and networks. SA responsibilities include: * Installing, maintaining and troubleshooting workstations, servers, OSs, software applications and other computing systems * Creating user accounts and assigning user permissions * Executing anti-virus mechanisms * Creating backup * Creating file systems * Monitoring network communication * Updating systems upon release of new OSs or software * Implementing computer, network and security policies for system and network users. * Light programming or scripting * User training and management * Hardware and software system security, such as protection against hardware theft and abuse, malware/spyware and unauthorized use of systems and components, including firewall and intrusion detection system maintenance (http://www.techopedia.com/definition/4815/system-administrator-sa Book:the practice of system and network administration second adition by:Tomas A,limoncile) Consequences of not doing your work as system administrator * There will be number of loss from the......

Words: 507 - Pages: 3

Premium Essay

It Admin

...Information Risk Management Plan Project Name | Network Vulnerability Colt Manufacturing R&D Server | Document Purpose The Project Information Risk Management Plan formalizes a system's information security and privacy upgrade. During the Project Planning Phase the project team: * works with Colt Manufacturing IT Department to register the data involved in the project and determine the data's classification. * useable resources in this document are reviewed to identify potential areas of information security and privacy risk. * document risks in the project Risk Register. During technical design activities in the Project Implementation phase, prior to purchasing or building an application: * System Proprietor (functional owner) works with the principal System Custodian to complete the Project Information Risk Management Plan. * Project Team submits the Plan to Colt Manufacturing IT Department and System/Network administrators for review and approval. Review & Approval Signature indicates review and approval of the Project Information Security Risk and Privacy Plan, and authorizes the Project Manager/Team to proceed with the detailed planning and execution of the project. Role | Name | Signature | Date | Colt Manufacturing Senior Management |                                                                            |                                                                                    |                      | IT......

Words: 3263 - Pages: 14

Premium Essay

Network System Admin

...mobile phone. The original iPhone had a 3.5 inch screen at 320 X480 and 163ppi, a quad-band 2G edge data radio, 802.1b.g Wi-Fi, Bluetooth 2.0 EDR, and a 2 megapixel camera. the iPhone was powered by an ARM-based Samsung 1176 Z-S processor and power VR MBX lite 3D graphics, 128 megabytes of random access memory(RAM), as well as four or eight gigabytes of NAND flash storage, and also could sync to iTunes. The iPhone software was very impressive, Apple used a full version of Safari, based on the exact same web kit HTML rendering engine that powered the desktop version on the Mac. Apple also created the best mobile YouTube and maps implementation ever seen on mobile. Unfortunately the original iPhone didn’t have CDMA and EVDO rev A network compatibility. That meant it couldn’t work on two of the U.S. big four carriers, Verizon and Sprint. This actually didn’t matter; because the original iPhone was exclusive to AT&T. In addition to no hardware keyboard or stylus, the iPhone also didn’t have a removable user replaceable battery, which didn’t please existing power users of the time. By 2012 Apple had released five more iPhones, 3G, 3GS, 4, 4S, and the 5. All these models offered a lot of upgrades from the first iPhone, bigger screen, more memory, better resolution, offered a white model instead of the normal black that everyone was accustomed to, not only did the phone have a camera it also had a camera on the front of the phone which no other smart phone was......

Words: 821 - Pages: 4

Free Essay

Network Admin

... 0 0 1 1 1 0 1 1 1 1 18. State the logic of the NOT function. Input output A X LOW (0) HIGH (1) HIGH (1) LOW (0) 19. When are multiple Boolean operators used together? If we have multiple stages to get our output we will use multiple operators. 20. State the relationship between bandwidth and frequency. The bandwidth deal with transferring data The frequency deal with speed of the data 21. What term defines the amount of information that can be sent or received through a computer or network connection in one second? Bit per second 22. List the two major methods of computer data transfer Parallel Transfer and Serial Transfer 23. Describe parallel transfers. Discuss pros and cons. All bits are transmitted over the multi- conductor. Data transferring is faster. Must be Ideal , but in reality is not always ideal, Skew and Jitter NOT easy to configure 24. Describe serial transfers. Discuss pros and cons. All bits are transmitted over the same conductor. The construction of the cable is simplified. Serial cables are cheaper. Easy to configure 25. Define Hertz. List several of the common multiples for Hertz. Hertz is one cycle per second MHz = megahertz GHz = gigahertz...

Words: 576 - Pages: 3

Premium Essay

Admin

...LOCAL AREA NETWORK TECHNOLOGY Local area network technology is the technology used to make local area network to support data communication by connecting terminals, computers and printers within a small limited geographical area. Examples of LAN Technology include; Token Ring, Fibre Distributed Data Interface (FDDI) and ARCNET. Local Area Network is a data communication network connecting Terminals, Computers and Printers within a building or other geographically limited area. These devices can be connected through wired cables or wireless link. It is also a communication network for computers within a building or small group of buildings. It may be configured as; 1. A bus, a main channel to which nodes or secondary channels are connected in a branching structure. 2. A ring in which each computer is connected to two neighbouring computers to form a closed circuit. 3. A star in which each computer is linked directly to a central computer and indirectly to one another. Each of these has an advantage though a bus configuration has become the most. ETHERNET Ethernet is a standard communications protocol embedded in software and hardware devices, intended for building a local area network (LAN). It was designed by Bob Metcalfe in 1973, and through the efforts of Digital, Intel and Xerox (for which Metcalfe worked), "DIX" Ethernet became the standard model for LANs worldwide EVOLUTOIN OF ETHERNET Ethernet evolved to include higher bandwidth, improved media...

Words: 1134 - Pages: 5

Premium Essay

Finance Admin

...of Samsung’s credit card business. As an outsider with deep inside knowledge, Choi took care to fit into the culture and as a result saw none of the assimilation problems that dogged many of his senior-level colleagues. He did not speak positions and, in implementing what they have learned, become important change agents. Squarely in this tradition is Samsung’s regional specialist program, arguably the company’s most important globalization effort. Each year for more than two decades, Samsung has sent some 200 talented young employees through an intensive 12week language-training course followed by one full year abroad. For the first six months, their only job is to become fluent in the language and culture and to build networks by making friends and exploring the country. In the second six months, they carry out one independent project of their choice. Initially sent mainly to developed countries, in the past 10 years they’ve gone English with his Korean colleagues. He showed full respect to subordinates older than he was. He generally behaved as other Korean employees of Samsung did. His advice to his fellow senior-level recruits is to do the same. Choi points to one of his successful protégés, whom he helped Samsung recruit in part because he knew the man would steep himself in Korean culture and be game, for instance, to eat kimchi and drink Korean wine at the dinner party given in his honor on his first day. Still, Choi is clear about......

Words: 4607 - Pages: 19

Free Essay

Network Admin

...Titulo: Development Strategies 1. Describir la tendencia que considera el software como un servicio más que un producto. ¿Qué efecto ha tenido esta tendencia sobre las opciones de adquisición de software? Tendencias de software basadas en la Web se han disparado los proveedores de servicios de aplicaciones (ASP), y las empresas que ofrecen servicios comerciales de Internet (SII) a una prominencia en la industria del software que cree en el software como un servicio en lugar de un producto. Con la popularidad y las ventajas de Internet, las empresas están viendo esta tendencia como una opción para el desarrollo de software estándar y adquisición. En lugar de comprar una aplicación de software de una empresa de desarrollo, producción que en la casa, o la contratación de un consultor o un recurso externo para producir un paquete de software de estas empresas basadas en la Web han proporcionado una nueva alternativa basada en tres modelos distintos. Estos modelos son un modelo de modelo de tarifa fija, el modelo de suscripción o uso. Cuota fija hace exactamente eso, ofrece una tarifa fija o coste basado en un nivel de servicio requerido por el usuario. El modelo de suscripción varía de costes basado en el número de usuarios y estaciones de trabajo con el acceso a la aplicación. El modelo de uso cobra una tarifa en función del volumen de transacciones o el número de operaciones realizadas por las aplicaciones. 2. Explicar la diferencia entre el software de aplicación......

Words: 1686 - Pages: 7

Premium Essay

Admin

...complains and applying all of RTA and MOI legalities. * Reporting correspondences with Ministry Of Interior, RTA, Northern Emirates Traffic Dep and all other related parties in both Arabic & English. * Documentation for all of VT Centers layouts, Etisalat site projects and all related documents concerned in launching new Shamil sites. * Organizing meetings between Emarat managers and other companies i.e. IT companies, Construction companies and Maintenance Companies. * Arranging, coordinating and conducting training courses that required to refresh staff customer services and communication skills abilities through Emarat Staff Training Team or external training agencies (Al Futtaim, Al Rostomani, Gargash, , Knowledge Networks and etc….) * Preparing Shamil annual budget plan, profitability presentation and Passed/ Failed tested vehicles charts. * Creating PR & PO which is related to Shamil suppliers and follow up the required approvals, supplying, delivery and payment of each item. * Attending phone calls for Emarat services inquires. * Inventory and invoicing processes including coordinating with Accounts Dep. * Checking income & outcome data related to Shamil Vehicle Testing Centers of Dubai and Northern Emirates. * Providing excellent customer service and handling customers’ complaints and reporting them to the management. * Strong links and relations with VT operators and coordinators all over UAE. * Strong links......

Words: 483 - Pages: 2

200g BRAVO BIG dicke Wolle Handstrickgarn Schnellstrickgarn zum Stricken Häkeln | The Good Wife 7. Sezon | Bảng giá thay lốp xe ô tô Renault mới nhất thị trường năm 2018