CIS 312 7,8,9 questions - Assignment Example

Comments (0) Cite this document
We used various ways to research tools used in Windows environment. First, we checked personally on the Window tab to ensure familiarity with the primary features. Secondly, I combined this search with documented information about such tools in Windows environment. A critical…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.2% of users find it useful
CIS 312 7,8,9 questions
Read TextPreview

Extract of sample "CIS 312 7,8,9 questions"

Computer Science and Information Technology Windows Tools and BSOD Errors Q1. A. We used various ways to research tools used in Windows environment. First, we checked personally on the Window tab to ensure familiarity with the primary features. Secondly, I combined this search with documented information about such tools in Windows environment. A critical reflection reveals that PsTools Suite such as the PsList tool is one of the most suitable for administrators because it allows management of local and remote systems.
B. I combined personal experimentation with Windows and review of documented materials to search for information about tools commonly used in Windows environment. For systems administrators, the PsList tool is a useful tool for enabling greater control over both local and remote systems, a key function in system administration.
A. Two methods for troubleshooting BSOD errors in Windows 8 are i. using safe mode, and ii, using Windows Boot Genius, a robust screen repair program. The Windows repair program is more useful to system administrators because it has over 20 OS repair tools that can help fix almost all boot issues including BSOD. Windows 9 xs/Me Resource Meter can also help in determining whether computer has sufficient FSRs (Soper, 2004).
B. The two primary methods of BSOD troubleshooting in Windows 8 include the BSOD screen repair program and the utilization of safe mode repair. The former method is more suitable for systems administrator because it enables repair of virtually all boot issues in Windows 8.
Network Connections
A. Networking components considered in home office to maximize functionality are the structure of management information (SMI), Management information base (MIB), and SNMP agents. SMI would help in defining data types allowed in MIB while the IB would help in holding value for managed objects based on packets that arrive from previous system reset. Lastly, SNMP agents components would help in executing all relevant MIB objects
B. The best networking components for maximizing functionality are SNMP components: SMI, which describes MIB data types, MIB that stores clock ticks since system resetting, and SNMP agent component, which define information contained in MIB to help in the management of used applications.
A. Various vendor support sites help in troubleshooting home internet connections. The most useful sites include the Network Diagnostic tool, Microsoft Automated Troubleshooting Services tools, as well as manual troubleshooting via,,, and for wired connections. Microsoft support sites are credible and robust.
B. Vendor supported sites for troubleshooting home connections include used for wired connections, and for manual troubleshooting. Both and are very useful to customers because of their credibility.
Ethical Concerns and Crime in Technology
A. Technology plays a critical in the today’s workplace. Consequently, although companies have a right to monitor technology usage, this should affect employee privacy. Constant monitoring of information technology can help companies to enhance information security. However, the need for enhanced security should never impede on user privacy. The primary position is that although security and privacy can be competing objectives in today’s workplace, companies have no moral (or even legal) right to intrude employee privacy on flimsy grounds of system monitoring.
B. Constant security monitoring is an obligation of any company running information systems. However, implementing strong security system does not necessarily mean intruding user privacy. Companies should never view security and privacy as exclusive goals. Rather, companies should protect both the security of its IT as well as the privacy of its users.
Q. 2
A. It is virtually impossible for cybercriminals to perpetuate this crime without technology. This means that technology serves as a tool for propagating crimes. In particular, technology equips cybercriminals with the tools and techniques for carrying out sophisticated attacks that are difficult to detect.
B. It is impossible to create the crime without using technology. That is, technology allows attackers to launch information system attacks that defy defense systems whilst allowing the criminals to remain anonymous.
Soper, M. (2004). Absolute Beginners Guide to A+ Certification. Que Publishing. Read More
Cite this document
  • APA
  • MLA
(“CIS 312 7,8,9 questions Assignment Example | Topics and Well Written Essays - 250 words”, n.d.)
CIS 312 7,8,9 questions Assignment Example | Topics and Well Written Essays - 250 words. Retrieved from
(CIS 312 7,8,9 Questions Assignment Example | Topics and Well Written Essays - 250 Words)
CIS 312 7,8,9 Questions Assignment Example | Topics and Well Written Essays - 250 Words.
“CIS 312 7,8,9 Questions Assignment Example | Topics and Well Written Essays - 250 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF CIS 312 7,8,9 questions

Questions 7 & 8 psychosocial dev

...or volunteering for tasks. The child is out to pursue evidences that he or she is already a “big” boy or girl and no longer a helpless baby. However, the reality that his youth brings many limitations to his abilities that need more time and practice to be honed, usually sets in and may cause him frustration and guilt at failing. If he is not able to deal with the frustration properly, then he may defer from taking initiative and let others decide things for him. Worse, he may question his capabilities and affect his self-esteem. The best way to help the child at this age is to encourage him to play constructively and entrust him with chores that he can be efficient at. This way, the conflict between initiative and...
2 Pages(500 words)Essay

Questions for Consideration (7-8)

... Finance and Accounting In my opinion, I support the idea of using one GAAP as compared to the use of different GAAP forsmall companies otherwise known as differential accounting. This is because the accounting requirements of any business are done with respect to the transactions being carried out. These transactions entail exchange of money, loan reimbursements, debits and credits. The solitary difference is the amounts involved. The multinational companies carry out their multi-billion transactions while the small companies transact using much lesser amounts (Alexander and Britton 219). Since there is a similarity in the business operations irrespective of whether it is a small business or a large organization... Finance and Accounting In...
1 Pages(250 words)Assignment

Questions 7 and 8

...Questions 7 and 8 Questions 7 and 8 Productivity of any business is the key to an organization success. In case workers do not use the available resources and their time efficiently, they end up costing the company money. This might result in deterioration of productivity of the business despite the increase in number of workers. During the time of expansion, the Chief Executive Officer of Canadian Fabrication and Design realized that productivity of the organization declined with an increase in number of employees (Hirschey, 2008, p. 12). The Chief Executive Officer makes a decision of reducing the number of employees with an aim of...
2 Pages(500 words)Coursework

Reading Response Questions for One.Life 8 & 9

...Reading Response Reading Response Chapter 8 Chapter 8 of the book discloses the view of McKnight Scot concerning the church. I have full agreement with the author’s view of the church since he urges people to get close to the heart of the message of Jesus through discovering the old rhythm of every day prayer at the heart of the early church. According to McKnight, the old church had a good way of praying and having fellowship with God. McKnight Scot says that through the early church, the old path of praying as Jesus did is understood, and through the path, people learn to worship and pray with the entire church, and not just by themselves as individuals (McKnight, 2010). In my view, the church is the...
2 Pages(500 words)Essay

CIS 312 4.5.6 question

...Computer Science and Information Technology DFS, Files, Directories. Share Q1. A. DFS affords organizations many benefits including fostering data migration, enhancing availability of file server data, and security integration. Since DFS has replication capability, it can server important role in recovery after an incident (Morimoto et al., 2006). B. The benefits of DFS technologies to organizations include server consolidation from older servers into fewer but larger more robust file servers, improved data availability, ability to use publishing applications, and DFS availability (Morimoto et al., 2006). DFS enables automatic system recovery after unanticipated stoppage or power loss. Q2. A. Assigning permissions to user groups... Science...
1 Pages(250 words)Assignment

CIS 273 7,8,9 questions

...CIS 273 Assignment Question One: Audio and HTML5 A) HTML5 supports several audio formats. Since there is no single format compatiblewith every browser, the tags find some usefulness in providing some level of assistance. Their display is for the browsers not supporting the

Why are ethics in sex research important

2 Pages(500 words)Essay

CIS Questions

...Validating Your Work" Please respond to the following: 7. Describe attribute minimization. Explain what would happen if you tried to vali a page containing instances of attribute minimization. Propose a solution to this problem. 8. There are many reasons to validate your Web design. Select one of these reasons and discuss its importance. "Understanding Validation" Please respond to the following: Attribute maximization is to validate a page for data maximization. When the user inputs data in a webpage, it requires authentication and validation. Additionally, validating a webpage requires a comprehensive encryption and security protocols. 9. From the e-Activity, identify a business of your...
4 Pages(1000 words)Coursework

Chapter 8-9 are more concerned about the increase in sales their promotion will bring. Advertising agencies have also responded to the changes in the economic activities by merging their companies to increase performance. With the growing globalization, several issues have also been noted by the players in advertising industry; questions that have raised serious concerns. The mistranslation of advertisements messages in different language is a critical issue. Consequently, the growing technology has escalated advertising as a corporate industry. Improvements in computer and television graphics are a major reason why advertisement has become commercial as it is. Historically, advertisement has been influenced by the...
2 Pages(500 words)Essay

The Challenges Faced by People with Cochlear Implants as It Relates to Prosody

.... Chatterjee, M., & Peng, S. (2008). Processing F0 with cochlear implants: Modulation frequency discrimination and speech intonation recognition. Hearing Research, 235(1-2) 5. Fletcher et al., 1999 S.G. Fletcher, F. Mahfuzh and H. Hendarmin, Nasalence in the speech of children with normal hearing and children with hearing loss, American Journal of Speech Language Pathology 8 (1999), pp. 241aˆ“248. 6. Flipsen Jr., P., & Parker, R. G. (2008). Phonological patterns in the conversational speech of children with cochlear implants. Journal of Communication Disorders, 41(4), 337-357. 7. Flipsen, J., Peter, & Colvard, L. G. (2005). Intelligibility of conversational speech produced by children with cochlear...
14 Pages(3500 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic CIS 312 7,8,9 questions for FREE!

Contact Us