Homework for Chapter 4 in CIS131

Total Page:16

File Type:pdf, Size:1020Kb

Homework for Chapter 4 in CIS131 CIS131 Chapter 4 When a question asks for a screenshot, please use the snipping tool ‘clip’ the portion of the screen requested. Do not use full desktop screenshots in your answers. When answering questions that ask for an explanation, your answer must be either a bulleted or numbered list of the exact steps taken to complete the task; do not answer in paragraph form. Assume I will follow the steps you provide to perform that task. Please be sure to label each answer with its respective problem number and make sure you answer ALL questions. You need not include the original questions within your homework document however if you choose to include the questions, make sure you use bold text when typing your answers. Do NOT Disable the Firewall on any machine in your domain. If you are not sure what I’m looking for – please ASK! Complete questions 1 thru 9 at the Server 1. Explain at least three different ways to open control panel. 2. Open Folder Options, pick a setting available on the View tab and provide a thorough explanation of the setting’s purpose. DO NOT choose: Always show menus, Hide Extensions for Known File types, Hide Protected Operating Systems files or Hidden files and folders Your answer must include: a. A screenshot of the folder options view tab with the setting you chose highlighted. b. An explanation of what the setting does when selected and what it does when not selected. If the setting you select changes something visually, include a screenshot of what it looks like when selected and when not selected. DO NOT just include screenshots; you must include an explanation in writing as well as the screenshots. c. Do you feel this setting is useful selected or not selected? Explain your answer. 3. From the command prompt explore the system32 directory and find all CPL files. These files can be used to open control panel items. Test at least 2. a. Provide the list of CPL files that you found. b. For each tool you tested, provide the exact command used to open the tool and explain its purpose. 4. Use the Control command to open a control panel item. (Note: Do not use a .cpl file in this answer.) a. What item did you open? b. What command did you use? 5. Explain 3 different ways to open Administrative Tools. 6. Where on your computer can you find what version/edition of Windows you’re running, what the speed is of your processor, how much RAM is installed and whether your computer is part of a domain or workgroup? a. Provide a one screenshot which provides all of the above information. 7. Add the Command Prompt to the Tools Menu in Server manager. a. Provide a list of steps used to complete the task. b. Provide a screenshot which confirms it was added. 8. From within computer management, connect to the Windows 7 client and view the client’s Application log within the Windows Logs in the Event Viewer node. a. Provide a screenshot of your entire Windows Server window. (I need to see the title bar at the top of the window which confirms you’re in the Windows server OS). I also need the first column of computer management wide enough so that I can see the name that appears to the right of “Computer Management”. 9. Use computer management to connect to the Windows 10 client and view the client’s disk configuration. a. Provide a screenshot of your entire Windows Server window. (I need to see the title bar at the top of the window which confirms you’re in the Windows server OS). I also need the first column of computer management wide enough so that I can see the name that appears to the right of “Computer Management”. 10. While at either your Windows 7 client or your Windows 10 client, use computer management (or services.msc) to connect to the server and view the server’s list of services. a. Provide a screenshot of your entire Client’s window. (I need to see the title bar at the top of the window which confirms you’re in the Client). I also need the first column of computer management wide enough so that I can see the name that appears to the right of “Computer Management”. 11. For each computer in your domain, provide a screenshot of the Windows Firewall screen. I need to see the status of each profile for each machine. a. Windows 2016 Screenshot of Firewall screen b. Windows 10 Screenshot of Firewall screen c. Windows 7 Screenshot of Firewall screen 12. For each computer in your domain, remove the volume icon from the notification area and configure the “Vmware tools” to show icon and notifications. Confirm that the settings have been appropriately configured by providing the following screenshots. a. Server: Screenshot of settings as well as of right-end of task bar. b. Windows 10: Screenshot of settings as well as of right-end of task bar. c. Windows 7: Screenshot of settings as well as of right-end of task bar. 13. What command can be used to activate a product key? (I am not asking that you execute this – just show me the command.) a. Include the command any its output. 14. Include a screenshot which confirms that your Windows Server has an activated product key. 15. Use the user’s startup folder on your Windows 10 client to configure the command prompt to open automatically every time you login. It should not open for anyone else that logs in at that computer. a. Provide a general explanation of how you configured this. b. What is the absolute path to the folder you used? c. Using Windows explorer, include a screenshot of the folder’s content – make sure the absolute path to the folder is displayed in the address bar. d. What shell command can you use to open the user’s startup folder? 16. Use the ‘all users’ startup folder on your Windows server to configure the command prompt to open automatically every time anyone logins in. a. Provide a general explanation of how you configured this. b. What is the absolute path to the folder you used? c. Using Windows explorer, include a screenshot of the folder’s content – make sure the absolute path to the folder is displayed in the address bar. d. What shell command can you use to open the all user’s startup folder? 17. Login as the local administrator on Windows 7. Confirm to me that this is who you’re logged in as; type whoami at the command prompt followed by hostname and provide a screenshot which includes both commands as well as the output of both commands. 18. Login as the domain administrator at Windows 7. Confirm to me that this is who you’re logged in as; type whoami at the command prompt followed by hostname and provide a screenshot which includes both commands as well as the output of both commands. 19. Login as the local administrator on Windows 10. Confirm to me that this is who you’re logged in as; type whoami at the command prompt followed by hostname and provide a screenshot which includes both commands as well as the output of both commands. 20. Login as the domain administrator at Windows 10. Confirm to me that this is who you’re logged in as; type whoami at the command prompt followed by hostname and provide a screenshot which includes both commands as well as the output of both commands. 21. Enable Remote Desktop at your Server. Confirm that your domain administrator can remotely access the server’s desktop from either one of the clients. a. Provide a list of steps used to complete this task. b. Provide a screenshot of the remote tab from the system properties at the server c. Provide a screenshot which confirms that the Administrator was successful at remotely connecting to the Server from a client. 22. You have a user in the Users container within Active Directory Users and computers named Dean. Dean is currently a member of the server’s remote desktop users group. His password is Microsoft! d. Login at either of the clients as Dean. Is he able to remote to the server? Why not? 23. Without changing any group memberships, make the appropriate change to the local security at the server that will give the remote desktop users group the ability to remote control the server. Test your results (if properly configured, Dean should be able to remote control the server) a. Provide a screenshot of the security setting you changed. b. Provide a screenshot which confirms that Dean was successful at remotely connecting to the Server from a client. 24. Set Dean’s remote desktop services session to end a disconnected session after 1 hour. a. Include a screenshot that confirms you’ve configured this setting. Make sure the screenshot includes the titlebar (user’s name is in title bar) 25. Explain two ways that you can view a list of users that are connected (locally and remotely to the server. Your answers must include screenshots of the lists. .
Recommended publications
  • Program #6: Word Count
    CSc 227 — Program Design and Development Spring 2014 (McCann) http://www.cs.arizona.edu/classes/cs227/spring14/ Program #6: Word Count Due Date: March 11 th, 2014, at 9:00 p.m. MST Overview: The UNIX operating system (and its variants, of which Linux is one) includes quite a few useful utility programs. One of those is wc, which is short for Word Count. The purpose of wc is to give users an easy way to determine the size of a text file in terms of the number of lines, words, and bytes it contains. (It can do a bit more, but that’s all of the functionality that we are concerned with for this assignment.) Counting lines is done by looking for “end of line” characters (\n (ASCII 10) for UNIX text files, or the pair \r\n (ASCII 13 and 10) for Windows/DOS text files). Counting words is also straight–forward: Any sequence of characters not interrupted by “whitespace” (spaces, tabs, end–of–line characters) is a word. Of course, whitespace characters are characters, and need to be counted as such. A problem with wc is that it generates a very minimal output format. Here’s an example of what wc produces on a Linux system when asked to count the content of a pair of files; we can do better! $ wc prog6a.dat prog6b.dat 2 6 38 prog6a.dat 32 321 1883 prog6b.dat 34 327 1921 total Assignment: Write a Java program (completely documented according to the class documentation guidelines, of course) that counts lines, words, and bytes (characters) of text files.
    [Show full text]
  • DC Console Using DC Console Application Design Software
    DC Console Using DC Console Application Design Software DC Console is easy-to-use, application design software developed specifically to work in conjunction with AML’s DC Suite. Create. Distribute. Collect. Every LDX10 handheld computer comes with DC Suite, which includes seven (7) pre-developed applications for common data collection tasks. Now LDX10 users can use DC Console to modify these applications, or create their own from scratch. AML 800.648.4452 Made in USA www.amltd.com Introduction This document briefly covers how to use DC Console and the features and settings. Be sure to read this document in its entirety before attempting to use AML’s DC Console with a DC Suite compatible device. What is the difference between an “App” and a “Suite”? “Apps” are single applications running on the device used to collect and store data. In most cases, multiple apps would be utilized to handle various operations. For example, the ‘Item_Quantity’ app is one of the most widely used apps and the most direct means to take a basic inventory count, it produces a data file showing what items are in stock, the relative quantities, and requires minimal input from the mobile worker(s). Other operations will require additional input, for example, if you also need to know the specific location for each item in inventory, the ‘Item_Lot_Quantity’ app would be a better fit. Apps can be used in a variety of ways and provide the LDX10 the flexibility to handle virtually any data collection operation. “Suite” files are simply collections of individual apps. Suite files allow you to easily manage and edit multiple apps from within a single ‘store-house’ file and provide an effortless means for device deployment.
    [Show full text]
  • AT Command User Guide 80591ST10886A Rev
    LN940 SERIES AT Command User Guide 80591ST10886A Rev. 1.4 – 2018-04-05 ] 7 .201 Mod. 0806 2017-01 Rev.6 01 [ SPECIFICATIONS ARE SUBJECT TO CHANGE WITHOUT NOTICE NOTICES LIST While reasonable efforts have been made to assure the accuracy of this document, Telit assumes no liability resulting from any inaccuracies or omissions in this document, or from use of the information obtained herein. The information in this document has been carefully checked and is believed to be reliable. However, no responsibility is assumed for inaccuracies or omissions. Telit reserves the right to make changes to any products described herein and reserves the right to revise this document and to make changes from time to time in content hereof with no obligation to notify any person of revisions or changes. Telit does not assume any liability arising out of the application or use of any product, software, or circuit described herein; neither does it convey license under its patent rights or the rights of others. It is possible that this publication may contain references to, or information about Telit products (machines and programs), programming, or services that are not announced in your country. Such references or information must not be construed to mean that Telit intends to announce such Telit products, programming, or services in your country. COPYRIGHTS This instruction manual and the Telit products described in this instruction manual may be, include or describe copyrighted Telit material, such as computer programs stored in semiconductor memories or other media. Laws in the Italy and other countries preserve for Telit and its licensors certain exclusive rights for copyrighted material, including the exclusive right to copy, reproduce in any form, distribute and make derivative works of the copyrighted material.
    [Show full text]
  • Lab - Observing DNS Resolution (Instructor Version) Instructor Note: Red Font Color Or Gray Highlights Indicate Text That Appears in the Instructor Copy Only
    Lab - Observing DNS Resolution (Instructor Version) Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Objectives Part 1: Observe the DNS Conversion of a URL to an IP Address Part 2: Observe DNS Lookup Using the Nslookup Command on a Web Site Part 3: Observe DNS Lookup Using the Nslookup Command on Mail Servers Background / Scenario The Domain Name System (DNS) is invoked when you type a Uniform Resource Locator (URL), such as http://www.cisco.com, into a web browser. The first part of the URL describes which protocol is used. Common protocols are Hypertext Transfer Protocol (HTTP), Hypertext Transfer Protocol over Secure Socket Layer (HTTPS), and File Transfer Protocol (FTP). DNS uses the second part of the URL, which in this example is www.cisco.com. DNS translates the domain name (www.cisco.com) to an IP address to allow the source host to reach the destination host. In this lab, you will observe DNS in action and use the nslookup (name server lookup) command to obtain additional DNS information. Work with a partner to complete this lab. Required Resources 1 PC (Windows 7, Vista, or XP with Internet and command prompt access) Part 1: Observe the DNS Conversion of a URL to an IP Address a. Click the Windows Start button, type cmd into the search field, and press Enter. The command prompt window appears. b. At the command prompt, ping the URL for the Internet Corporation for Assigned Names and Numbers (ICANN) at www.icann.org. ICANN coordinates the DNS, IP addresses, top-level domain name system management, and root server system management functions.
    [Show full text]
  • Your Performance Task Summary Explanation
    Lab Report: 11.2.5 Manage Files Your Performance Your Score: 0 of 3 (0%) Pass Status: Not Passed Elapsed Time: 6 seconds Required Score: 100% Task Summary Actions you were required to perform: In Compress the D:\Graphics folderHide Details Set the Compressed attribute Apply the changes to all folders and files In Hide the D:\Finances folder In Set Read-only on filesHide Details Set read-only on 2017report.xlsx Set read-only on 2018report.xlsx Do not set read-only for the 2019report.xlsx file Explanation In this lab, your task is to complete the following: Compress the D:\Graphics folder and all of its contents. Hide the D:\Finances folder. Make the following files Read-only: D:\Finances\2017report.xlsx D:\Finances\2018report.xlsx Complete this lab as follows: 1. Compress a folder as follows: a. From the taskbar, open File Explorer. b. Maximize the window for easier viewing. c. In the left pane, expand This PC. d. Select Data (D:). e. Right-click Graphics and select Properties. f. On the General tab, select Advanced. g. Select Compress contents to save disk space. h. Click OK. i. Click OK. j. Make sure Apply changes to this folder, subfolders and files is selected. k. Click OK. 2. Hide a folder as follows: a. Right-click Finances and select Properties. b. Select Hidden. c. Click OK. 3. Set files to Read-only as follows: a. Double-click Finances to view its contents. b. Right-click 2017report.xlsx and select Properties. c. Select Read-only. d. Click OK. e.
    [Show full text]
  • NETSTAT Command
    NETSTAT Command | NETSTAT Command | Use the NETSTAT command to display network status of the local host. | | ┌┐────────────── | 55──NETSTAT─────6─┤ Option ├─┴──┬────────────────────────────────── ┬ ─ ─ ─ ────────────────────────────────────────5% | │┌┐───────────────────── │ | └─(──SELect───6─┤ Select_String ├─┴ ─ ┘ | Option: | ┌┐─COnn────── (1, 2) ──────────────── | ├──┼─────────────────────────── ┼ ─ ──────────────────────────────────────────────────────────────────────────────┤ | ├─ALL───(2)──────────────────── ┤ | ├─ALLConn─────(1, 2) ────────────── ┤ | ├─ARp ipaddress───────────── ┤ | ├─CLients─────────────────── ┤ | ├─DEvlinks────────────────── ┤ | ├─Gate───(3)─────────────────── ┤ | ├─┬─Help─ ┬─ ───────────────── ┤ | │└┘─?──── │ | ├─HOme────────────────────── ┤ | │┌┐─2ð────── │ | ├─Interval─────(1, 2) ─┼───────── ┼─ ┤ | │└┘─seconds─ │ | ├─LEVel───────────────────── ┤ | ├─POOLsize────────────────── ┤ | ├─SOCKets─────────────────── ┤ | ├─TCp serverid───(1) ─────────── ┤ | ├─TELnet───(4)───────────────── ┤ | ├─Up──────────────────────── ┤ | └┘─┤ Command ├───(5)──────────── | Command: | ├──┬─CP cp_command───(6) ─ ┬ ────────────────────────────────────────────────────────────────────────────────────────┤ | ├─DELarp ipaddress─ ┤ | ├─DRop conn_num──── ┤ | └─RESETPool──────── ┘ | Select_String: | ├─ ─┬─ipaddress────(3) ┬ ─ ───────────────────────────────────────────────────────────────────────────────────────────┤ | ├─ldev_num─────(4) ┤ | └─userid────(2) ─── ┘ | Notes: | 1 Only ALLCON, CONN and TCP are valid with INTERVAL. | 2 The userid
    [Show full text]
  • Programmable AC/DC Electronic Load
    Programmable AC/DC Electronic Load Programming Guide for IT8600 Series Model: IT8615/IT8615L/IT8616/IT8617 /IT8624/IT8625/IT8626/IT8627/IT8628 Version: V2.3 Notices Warranty Safety Notices © ItechElectronic, Co., Ltd. 2019 No part of this manual may be The materials contained in this reproduced in any form or by any means document are provided .”as is”, and (including electronic storage and is subject to change, without prior retrieval or translation into a foreign notice, in future editions. Further, to A CAUTION sign denotes a language) without prior permission and the maximum extent permitted by hazard. It calls attention to an written consent from Itech Electronic, applicable laws, ITECH disclaims operating procedure or practice Co., Ltd. as governed by international all warrants, either express or copyright laws. implied, with regard to this manual that, if not correctly performed and any information contained or adhered to, could result in Manual Part Number herein, including but not limited to damage to the product or loss of IT8600-402266 the implied warranties of important data. Do not proceed merchantability and fitness for a beyond a CAUTION sign until Revision particular purpose. ITECH shall not the indicated conditions are fully be held liable for errors or for 2nd Edition: Feb. 20, 2019 understood and met. incidental or indirect damages in Itech Electronic, Co., Ltd. connection with the furnishing, use or application of this document or of Trademarks any information contained herein. A WARNING sign denotes a Pentium is U.S. registered trademarks Should ITECh and the user enter of Intel Corporation. into a separate written agreement hazard.
    [Show full text]
  • Program That Runs Other Programs Unix/Linux Process Hierarchy Shell
    shell: program that runs other programs Building a Shell 1 5 Unix/Linux Process Hierarchy shell program that runs other programs on behalf of the user sh Original Unix shell (Stephen Bourne, AT&T Bell Labs, 1977) [0] bash “Bourne-Again” Shell, widely used default on most Unix/Linux/Mac OS X systems others.. init [1] while (true) { Print command prompt. Daemon Login shell Read command line from user. e.g. httpd Parse command line. If command is built-in, do it. Child Child Child Else fork process to execute command. in child: Execute requested command with execv. (never returns) Grandchild Grandchild in parent: Wait for child to complete. } 6 7 1 terminal ≠ shell Background vs. Foreground User interface to shell and other programs. Users generally run one command at a time Graphical (GUI) vs. command-line (CLI) Type command, read output, type another command Command-line terminal (emulator): Input (keyboard) Some programs run “for a long time” Output (screen) $ emacs fizz. txt # shell stuck until ema cs exi ts. A “background” job is a process we don't want to wait for $ emacs boom. txt & # em acs ru ns in backg round [1] 9073 # wh ile sh ell i s... $ gdb ./ umbre lla # im mediat ely r eady f or nex t com mand don't do this with emacs un l es s u si n g X wi nd o ws vers i o n 8 9 Managing Background Jobs Signals Signal: small message notifying a process of event in system Shell waits for and reaps foreground jobs.
    [Show full text]
  • Student Batch File Layout – Version 1.0
    Student Batch File Layout – Version 1.0 This document shall set forth the layout of the Student Batch File that will be used for feeding student records into the Uniq-ID System for id assignment and/or student information updates. The Student Batch File should contain three different types of records. The three types of records are: (1) Header record (2) Detail Record (3) Trailer Record. The Header and Trailer record should be delimited by a single tab or space character. The Detail records can be either tab or comma delimited and the Header record should identify which type is being used (in the delimiter field). All records should be delimited from each by the source operating system’s end of line character or character sequence. In the Uniq-ID System, errors in the Student Batch File will be handled in two different ways. One way is to flag the particular record and allow the user to repair it in the “Fix Errors” stage. The other way is to reject the entire Student Batch File and require that the user resubmit it. Rejection of a Student Batch File will occur if: 1. One or more record types are missing. 2. One or more fields have been omitted from a record. 3. The “Number of Records” field in the trailer record is incorrect. 4. The “Transmission ID” fields in the header and trailer records do not match. 5. The maximum allowable number of detail record errors has been exceeded. 6. The maximum allowable number of records in the entire file has been exceeded.
    [Show full text]
  • Introduction to Unix Shell
    Introduction to Unix Shell François Serra, David Castillo, Marc A. Marti- Renom Genome Biology Group (CNAG) Structural Genomics Group (CRG) Run Store Programs Data Communicate Interact with each other with us The Unix Shell Introduction Interact with us Rewiring Telepathy Typewriter Speech WIMP The Unix Shell Introduction user logs in The Unix Shell Introduction user logs in user types command The Unix Shell Introduction user logs in user types command computer executes command and prints output The Unix Shell Introduction user logs in user types command computer executes command and prints output user types another command The Unix Shell Introduction user logs in user types command computer executes command and prints output user types another command computer executes command and prints output The Unix Shell Introduction user logs in user types command computer executes command and prints output user types another command computer executes command and prints output ⋮ user logs off The Unix Shell Introduction user logs in user types command computer executes command and prints output user types another command computer executes command and prints output ⋮ user logs off The Unix Shell Introduction user logs in user types command computer executes command and prints output user types another command computer executes command and prints output ⋮ user logs off shell The Unix Shell Introduction user logs in user types command computer executes command and prints output user types another command computer executes command and prints output
    [Show full text]
  • Chapter 1 -Using the Command-Line Interface
    CHAPTER 1 Using the Command-Line Interface The command-line interface (CLI) is a line-oriented user interface that provides commands for configuring, managing, and monitoring the Cisco wireless LAN controller. This chapter contains the following topics: • CLI Command Keyboard Shortcuts, page 1-2 • Using the Interactive Help Feature, page 1-3 Cisco Wireless LAN Controller Command Reference OL-19843-02 1-1 Chapter 1 Using the Command-Line Interface CLI Command Keyboard Shortcuts CLI Command Keyboard Shortcuts Table 1-1 lists CLI keyboard shortcuts to help you enter and edit command lines on the controller. Table 1-1 CLI Command Keyboard Shortcuts Action Description Keyboard Shortcut Change The word at the cursor to lowercase. Esc I The word at the cursor to uppercase. Esc u Delete A character to the left of the cursor. Ctrl-h, Delete, or Backspace All characters from the cursor to the beginning of Ctrl-u the line. All characters from the cursor to the end of the line. Ctrl-k All characters from the cursor to the end of the Esc d word. The word to the left of the cursor. Ctrw-w or Esc Backspace Display MORE Exit from MORE output. q, Q, or Ctrl-C output Next additional screen. The default is one screen. Spacebar To display more than one screen, enter a number before pressing the Spacebar key. Next line. The default is one line. To display more Enter than one line, enter the number before pressing the Enter key. Enter an Enter or Return key character. Ctrl-m Expand the command or abbreviation.
    [Show full text]
  • DC Load Application Note
    DC Electronic Load Applications and Examples Application Note V 3032009 22820 Savi Ranch Parkway Yorba Linda CA, 92887-4610 www.bkprecision.com Table of Contents INTRODUCTION.........................................................................................................................3 Overview of software examples........................................................................................................3 POWER SUPPLY TESTING.......................................................................................................4 Load Transient Response.................................................................................................................4 Load Regulation................................................................................................................................5 Current Limiting................................................................................................................................6 BATTERY TESTING...................................................................................................................7 Battery Discharge Curves.................................................................................................................7 Battery Internal Resistances.............................................................................................................8 PERFORMANCE TESTING OF DC LOADS...........................................................................10 Slew Rate.......................................................................................................................................10
    [Show full text]