StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

CIS 312 7,8,9 questions - Assignment Example

Cite this document
Summary
We used various ways to research tools used in Windows environment. First, we checked personally on the Window tab to ensure familiarity with the primary features. Secondly, I combined this search with documented information about such tools in Windows environment. A critical…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.5% of users find it useful
CIS 312 7,8,9 questions
Read Text Preview

Extract of sample "CIS 312 7,8,9 questions"

Computer Science and Information Technology Windows Tools and BSOD Errors Q1. A. We used various ways to research tools used in Windows environment. First, we checked personally on the Window tab to ensure familiarity with the primary features. Secondly, I combined this search with documented information about such tools in Windows environment. A critical reflection reveals that PsTools Suite such as the PsList tool is one of the most suitable for administrators because it allows management of local and remote systems. B. I combined personal experimentation with Windows and review of documented materials to search for information about tools commonly used in Windows environment.

For systems administrators, the PsList tool is a useful tool for enabling greater control over both local and remote systems, a key function in system administration. Q2. A. Two methods for troubleshooting BSOD errors in Windows 8 are i. using safe mode, and ii, using Windows Boot Genius, a robust screen repair program. The Windows repair program is more useful to system administrators because it has over 20 OS repair tools that can help fix almost all boot issues including BSOD. Windows 9 xs/Me Resource Meter can also help in determining whether computer has sufficient FSRs (Soper, 2004).B. The two primary methods of BSOD troubleshooting in Windows 8 include the BSOD screen repair program and the utilization of safe mode repair.

The former method is more suitable for systems administrator because it enables repair of virtually all boot issues in Windows 8. Network ConnectionsQ1. A. Networking components considered in home office to maximize functionality are the structure of management information (SMI), Management information base (MIB), and SNMP agents. SMI would help in defining data types allowed in MIB while the IB would help in holding value for managed objects based on packets that arrive from previous system reset.

Lastly, SNMP agents components would help in executing all relevant MIB objects B. The best networking components for maximizing functionality are SNMP components: SMI, which describes MIB data types, MIB that stores clock ticks since system resetting, and SNMP agent component, which define information contained in MIB to help in the management of used applications. Q2. A. Various vendor support sites help in troubleshooting home internet connections. The most useful sites include the Network Diagnostic tool, Microsoft Automated Troubleshooting Services tools, as well as manual troubleshooting via http://www.microsoft.com, http://www.msn.com, http://support.microsoft.com/gp/vendors/en-us, and http://windowshelp.microsoft.com/Windows/en-US/Help/33307acf-0698-41ba-b014-ea0a2eb8d0a81033.

mspx for wired connections. Microsoft support sites are credible and robust. B. Vendor supported sites for troubleshooting home connections include http://windowshelp.microsoft.com/Windows/en-US/Help/33307acf-0698-41ba-b014-ea0a2eb8d0a81033.mspx used for wired connections, and http://www.msn.com for manual troubleshooting. Both http://www.msn.com and http://www.microsoft.com are very useful to customers because of their credibility. Ethical Concerns and Crime in TechnologyQ.1 A. Technology plays a critical in the today’s workplace.

Consequently, although companies have a right to monitor technology usage, this should affect employee privacy. Constant monitoring of information technology can help companies to enhance information security. However, the need for enhanced security should never impede on user privacy. The primary position is that although security and privacy can be competing objectives in today’s workplace, companies have no moral (or even legal) right to intrude employee privacy on flimsy grounds of system monitoring. B. Constant security monitoring is an obligation of any company running information systems.

However, implementing strong security system does not necessarily mean intruding user privacy. Companies should never view security and privacy as exclusive goals. Rather, companies should protect both the security of its IT as well as the privacy of its users. Q. 2A. It is virtually impossible for cybercriminals to perpetuate this crime without technology. This means that technology serves as a tool for propagating crimes. In particular, technology equips cybercriminals with the tools and techniques for carrying out sophisticated attacks that are difficult to detect. B. It is impossible to create the crime without using technology.

That is, technology allows attackers to launch information system attacks that defy defense systems whilst allowing the criminals to remain anonymous. ReferencesSoper, M. (2004). Absolute Beginners Guide to A+ Certification. Que Publishing.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“CIS 312 7,8,9 questions Assignment Example | Topics and Well Written Essays - 250 words”, n.d.)
CIS 312 7,8,9 questions Assignment Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1678495-cis-312-789-questions
(CIS 312 7,8,9 Questions Assignment Example | Topics and Well Written Essays - 250 Words)
CIS 312 7,8,9 Questions Assignment Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1678495-cis-312-789-questions.
“CIS 312 7,8,9 Questions Assignment Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1678495-cis-312-789-questions.
  • Cited: 0 times

CHECK THESE SAMPLES OF CIS 312 7,8,9 questions

The Challenges and Opportunities of BMW

Research questions 5 SECTION 2: LITERATURE REVIEW... The Challenges and Opportunities of BMW Executive Summary This research paper aims at identifying the challenges and opportunities of BMW AG.... However, for conducting a systematic research and deriving results in a structured manner, a specific challenge of BMW AG has been choose....
9 Pages (2250 words) Assignment

Pakistan: Sruggle for the Soul

Pakistan came into being as an independent nation in the year 1947 when the British hurriedly gave up their 100 years old colonial rule of the Indian sub continent in South Asia.... On the insistence of a Muslim leader, Mohammad Ali Jinnah it was agreed by the British rulers to… The area of the country was demarcated in a hurried manner which resulted in border disputes with India which exist till date....
2 Pages (500 words) Essay

Lipstick sales in the Recession

Women use lipstick as an essential item of makeup however, they indulge in buying more lipstick in times of recession and especially when their purchasing power… The results of this research confirm that women substitute other luxury items like handbags and shoes with lipstick to please themselves....
17 Pages (4250 words) Thesis

The Anatomy of the Lungs

The paper "The Anatomy of the Lungs" tries to explain the anatomy of the lungs of an adult person with presumed healthy and complete parts of it.... As the pair of adult lungs play a vital role in the oxygenation of every part of the body.... hellip; As likened by Wang, the respiration system, which mainly includes the lungs, assumes an inverted tree form....
6 Pages (1500 words) Assignment

Materials Analysis/Selection

In the endeavor to come up with the right material for use in any particular application, it is mandatory that an engineer should be well acquainted with the material properties.... The issues of material put into perspective are the material properties, material market cost, and… Moreover, the process involved in making the material part is an idea not worth forsaking....
4 Pages (1000 words) Coursework

The Problem With Liability for Non-Conforming Goods

This research proposal "The Problem With Liability for Non-Conforming Goods Under an International Contract for the Sale of Goods" examines the Hague-Visby Rules and the Hamburg Rules and determines whether or not they have effectively contemplated every conceivable circumstance in which liability can arise....
11 Pages (2750 words) Research Proposal

Credit Default Swap

From the paper "Credit Default Swap" it is clear that CEU does not have AAA credit rating to make the bond attractive to investors.... Investors are coming out of a situation where they were told by certain institutions that they were investing in bonds with AAA rating when this was not so.... nbsp;… Kittel should assess CEU regularly to determine if there is anything that would change his expectations....
6 Pages (1500 words) Assignment

The Best Methodology for Manufacturing a Specific Components

It assists in the selection of the materials and processes in a very similar manner, with each approach relying on the ideas of the critical questions that were asked.... The paper raises the question is whether the material produces strong steel pressure vessels that can withstand the hardness testing for the mechanical behavior of materials....
6 Pages (1500 words) Lab Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us