Discussion Question 1:
You are an administrator of a Windows Network Infrastructure that has 200 servers running Windows Server 2016 and you need to deploy another 100 servers over the next few months. You want to ensure that each server has the following configuration performed:
Certain server roles and features need to be installed.
A set of default users and groups needs to be created on each server.
Diagnostic and malware software needs to be deployed.
Describe how to ensure that your current servers and any servers that you install will have this base configuration. Also, describe how to ensure that when these settings are changed, the system is automatically reconfigured.
Discussion Question 2:
Pick a PowerShell command and elaborate on how it can be used in a Server 2016 environment. Explain if there is a comparable way to do the same thing at the Command Line in Windows or by using the GUI.
Engage the community:
Begin by finding an ethical issue or social problem that currently impacts or has recently impacted your local or regional community (such as your neighborhood, town or city, county, school district, religious community, or something of similar scope to any of these).
Briefly summarize the issue or problem, and provide a link to a news article, video, or some other resource that documents the issue or problem so that your fellow students can learn more about it when formulating their responses to you.
Apply the theory:
Next, choose one of the ethical theories and discuss how the moral reasoning of the theory might be used to address or resolve the issue or problem.
Evaluate the reasoning:
In evaluating the application of the moral theory you may, for example, consider one or more questions like:
Does this differ from the way this issue is currently being addressed?
Does it present a better response than another ethical approach would?
Do
Respond to the following questions in at least 500 words.
Do you agree or disagree with the statement: "Augmented reality has been normalized to the point you probably encounter it on an almost daily basis?"
Where have you seen/used AR?
What value does it add to that experience/platform?
What other services/platforms do you think would be made better by AR? Do you think there are any that could be made worse?
What will it take for Virtual Reality to reach the same sense of ubiquity that AR has recently achieved?
Back up your opinion/argument with at least one cited source.
1.(A) First, briefly explain in your own words what the main functions of the CPU are?
1.(B) Second, to help further your mastery of the CPU, explain what a CPU does when an interrupt occurs. (Please do not forget to explain how the CPU detects and interrupt, how the interrupt is handled, and what happens when the interrupt has been serviced.)
1.(C)Third, express your thoughts on the following question. Do you wish the CPU could do more? (Don't be a wise guy and say you wish the CPU had emotions. In the near future, a CPU with emotions may be a reality. But let's not discuss this now!)
2. Next, think of the CPU as a limited extension of your logical brain. Do you think it does a decent job in this capacity? Does this brain do all the functions you would want this type of brain to do? Does it do stuff you wouldn't want it to do? Also does this brain treat interruptions effectively? Would you want this brain to deal with interruptions? How would you want it to do it?
Module 9 introduces you to Decision Support Systems. This week you will be investigating some of these concepts.
Download this attached document and review the contents. A Brief History of Decision Support Systems.pdf
Section IV discusses the development and evolution of Decision Support Systems and identifies several categories :
Model Driven DSS
Data Driven DSS
Communications Driven DSS
Document Driven DSS
Knowledge Driven DSS
Instructions
Complete the following steps:
Conduct some research and provide an example of a Decision Support System for each category.
Explain what it is used for and identify the characteristics of the DSS that you used to classify it in that particular category.
Include any links or citations supporting your analysis.
You will be submitting this assignment through a Plagiarism detector tool called Turn it in. Turnitin is used for some of the assignments in this course. Once you submit your work, please look
1. Draw a block diagram showing the major components of a computer and their relationships. Briefly describe the function of each component?
2. List five input devices and three output devices that might be attached to a personal computer. Describe a typical use for each?
3. Name and describe three special-purpose input devices people commonly use in public places, such as stores, banks, and libraries, that are not used in other places?
4. What are the advantages and disadvantages of flash memory devices over hard disks as storage media?
5. Describe how touchscreen technology can make common input tasks more efficient
6. Some commonly used peripherals can be described as both input and output devices.
7. System software is the set of software programs that helps run the computer and coordinates instructions between application software and hardware devices. It consists of the operating system (OS) and utility programs. how does the mindset of the d
Think of a relevant topic for your current or future career for which you have been asked to create an informative social media post with an appropriate graphic (this can be one visual from the Internetjust make sure it is appropriate and cited correctly).
State the social media platform the post is for and the topic.
Explain why you chose the social media platform that you did.
Explain why this specific audience was selected.
Create the text of the social media post.
Provide a link to the visual you located to go with your post. (This may be one of the visuals that you located in the Discussion Preparation.)
Explain why you think the visual you provided enhances the written communication of your social media post.
The topic is Challenging facing IoT (Internet of Things)
Paper should be minimum 14 pages of text, including title, summary, references, and table of contents. Keep in mind: Length is not a factor in evaluating case studies. There are excellent shorter case studies and boring long ones. Please make sure that spelling and grammar are checked. Extensive mistakes will results in a lower grade. Font size should be 12 points on double spacing. Make use of visualizations, graphics and figures. Please cite all references. Again: please cite all references. If in doubt, ask the instructor in advance. Use APA style in writing your report.
As a minimum, your paper should answer the following questions:
1. Why did you choose this topic?
2. What business/industry used this technology?
3. What service/product offerings using this technology if any?
4. What are the critical factors for success of this technology?
5. What are upcoming threats and opportunities for this technology
After reading the article "Don't Include Social Engineering in Penetration Tests [https://jacobian.org/2017/jun/27/social-engineering-pentests/]," discuss whether social engineering should be included as part of a penetration test. Knowing that the human is the weakest link in the cybersecurity chain, is it ethical as part of the pen test to engage in behavior that the author describes as a "grey area: compromising staff members' personal devices or personal email accounts (as opposed to work accounts); breaking into office buildings to steal equipment or plant network monitoring devices; compromising social media accounts to perform recon; etc."? (Kaplan-Moss, 2017)
References
Kaplan-Moss, J. (2017, June 27). Don't include social engineering in penetration tests [Blog post]. Retrieved from https://jacobian.org/2017/jun/27/social-engineering-pentests/
Embedded computers keep turning up in new places.
They can be found in cars, household appliances, smoke detectors, and thermostats too, enabling us to interact with even more of these smart devices every day.
1.What common objects do you think might benefit from an embedded computer?
2.What capabilities can you envision?