Free

CIS256 U2 Project - Essay Example

Comments (0) Cite this document
Summary
The structure followed a geographic model in creating the organization units where the categorization was based on the four offices located in different locations. The four departments also exist as individual, organizational units in each of the four rooms with their naming…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.4% of users find it useful
CIS256 U2 Project
Read TextPreview

Extract of sample "CIS256 U2 Project"

Design of ECPI EMR Insert Insert Part The structure followed a geographic model in creating the organization units where the categorization was based on the four offices located in different locations. The four departments also exist as individual, organizational units in each of the four rooms with their naming based on their departmental names.
Part 2
How the users are named in the domain
A suitable name convention in the company would be fistname_secondname. When the first and second names are similar, we add the initial of the middle names. For instance, if the names are James Mathews King and James Mathews David, the resultant names are: james_mathewsK and james_mathewsD. The later is because of the anticipated level of growth for the firm (Minasi, 2010). Therefore, there is a need for a standard format to cater for the increasing number of users. Therefore for the five domain accounts, the names will be as follows:
Jill_smith
Steve_mauser
Corey_ramsey
Shelley_munger
Jeffrey_shohl
Part 3
Security groups in the company function to group the computers, the users and other groups that will be necessary for assigning permissions to various resources. On the other hand, the distribution groups are important when creating lists for email distribution.
Group Name
Use in company
Role of members
Scope
Managers
Distribution
Oversee work and staff
Global
Administrators
Administration
Administer the systems i.e. assign permissions
Global
Domain computers
Administration
Users of active directory
Global
Account operators
Administrative control in the particular domain
They use the active directory
local
Other users
Use the system
Use resources of the company to accomplish tasks
local
References
Minasi, M. (2010). Mastering Windows Server 2008 R2. Indianapolis, Ind.: Wiley Pub. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“CIS256 U2 Project Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
CIS256 U2 Project Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1695339-cis256-u2-project
(CIS256 U2 Project Essay Example | Topics and Well Written Essays - 250 Words)
CIS256 U2 Project Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1695339-cis256-u2-project.
“CIS256 U2 Project Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1695339-cis256-u2-project.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF CIS256 U2 Project

Bono and the U2 Band

...in so many ways. According to Ferran Adria, he mentions that every successful business model should have a driving force. In this case, the publicity gained by Bono and the U2 Band was entirely influenced by the advocacy practiced by Bono. The music initiates a business venture where Bono and the band have benefited from the commercial activity involved. The business model has been fully developed by creativity and innovations established by Bono, such as the establishment of organizations to fight against AIDS in Africa, have tailored his career to prominence. The theoretical model we advance has several implications. First, awareness of the "why" of or the motivation behind the project initiation can...
5 Pages(1250 words)Case Study

U2: How to Dismantle an Atomic Bomb

... U2: How to Dismantle an Atomic Bomb Years ago, when U2 evolved as a band, they decided to become a Christian group. But, somewhere in their journey, U2 emerged as a political band with songs voicing the conflict between Ireland and England and peaceful protest messages that were popular in the 80s. In 1987, U2 released their first big CD titled “Joshua Tree.” “Joshua Tree” put U2 on the music map with hits like “With or Without You” and “Where the Streets have no Name.” U2 continued to evolve throughout the 90s and burst back onto the scene in 2000 with the album “All that You Leave Behind.” Now, U2 is making a comeback with “How to Dismantle an Atomic Bomb.” It is their first big studio album in about four years... . In this...
2 Pages(500 words)Essay

Communiction Theories Ch. 25

1 Pages(250 words)Essay

MGMT345 U2 IP

...Racial discrimination in work place Question1. Taming racial discrimination in the business Racial discrimination is the discernment against an ethnic group of people with a difference race from the dominating ethnic group. Racial discrimination causes tension in all the areas that it tends to occur. In workplaces, discrimination against employees from different ethnic groups make brings about the poor performance of the company. In order to reduce this, certain measures need to be employed in order to reduce the tendency of business crisis. Management teams ought to come up with measures that bring the workers together and treat them equally no matter the race from which they come. Introduction of anti-racism laws in the company... discrimina...
2 Pages(500 words)Research Paper

MGMT402 U2 IP

... Sexual Harassment April 5, Introduction In terms of legal definition, sexual harassment is defined as including uninvited sexual advances. Another legal definition of sexual harassment is seeking sexual favors as a requirement for the sexual harassment’s requests, violating the provisions of Title 7 of the Civil Rights Act of 1964 (including 1991 revisions). Employment and other related laws penalize workplace sexual harassment culprits. Sexual Harassment Sexual harassment includes acts that discriminatingly affect the victim’s work conditions. The affect includes intimidating working conditions, offensive work environment, or hostile abuser –victim workplace relationship. Consequently, the harassed victim is forced to file... Sexual...
4 Pages(1000 words)Research Paper

MGMT236 U2 DB

...Staff Meeting Profesor Indeed, the use of staff meetings is a very good idea in finding definitions to the key values. The main objectiveis to make use of force field analysis to help come up with proper decision. The firm should ensure that a proper questionnaire is formed (Addleson, 2011). The questionnaire should be free from biasness and personal opinion. In forming and creating the questionnaire, a lot of considerations have to be put in mind. Firstly, the type of audience that the questionnaire targets. This will greatly help in analyzing the type of question that will be asked. Furthermore, it also helps the researcher know what type of response that will be given out (Addleson, 2011). The staff meeting is an important... Meeting...
1 Pages(250 words)Research Paper

U2 Are you listening

...U2 are you listening U2 are you listening The interviewee is an employee at a call center in a telecommunications company. The telephone technology used at the call center includes the Voice Response Unit. This technology is efficient for the organization since it collects vital information from customers prior to transferring their calls to an agent. Conversely, the interactive voice response provides information that the company chooses to make available to the customer. The company does not use scripts since the agents are expected to have excellent customer service skills, which is provided through recruitment training. Agents can place customers on hold only when they have to consult for a solution...
1 Pages(250 words)Coursework

U2 Case Project

...Case Project (Couse Number) February 9, (Faculty) Case Project In the first section of the study we are going to focus on research findings about sun.com, whois.net, and icann.org based on publicly available information about the trio. Let us now begin by featuring sum.com and then proceed to the next domain in the order of listing. Part 1 1. Sun.com i. IP Address The IP address of sun.com is 156.151.59.35. This is piece of open information is obtained through a ping command, that is, “ping sun.com”. ii. Domain Email Address From the raw registrar data at whois.is we are able to obtain the domain email address for sun.com which is domain_contact_ww_grp@oracle.com. iii. Registrar Information sun.com...
1 Pages(250 words)Coursework

CIS256 U3 Discussion

...Domain Service Insert Insert Domain Service is a service geared to convert words that can be physically read by the human being into IP addresses (Dettmer, 2003). These names represent the names of particular hosts. When the domain name is said to be fully qualified, it means that the hostname is a summation of the hostname and the domain name. For instance, gendersoft.domain.com. I would prefer Microsoft domain name service as compared to BIND DNS. The reasons for this include the centrality of access to the role as a part of the Windows server package (Minasi, 2014). It has a feature to allow it for configuration to suit both the recursive, authoritative and hybrid modes. Further, it has a DNS zone file that facilitates... Service Insert...
1 Pages(250 words)Essay

CIS256 Final Project

...Disaster recovery and business continuity plans Insert Insert The disaster recovery plan when dealing with active directory seeks toprevent reduced productivity, minimize the destruction of data and prevent interruption to the normal business routines (Rahman Mohamed, 2014). There has to be a work plan to bring back the active directory back into functionality when a failure occurs especially when forming the backbone of the organization’s network. Location 1 contains the domain controller thus requires a disaster recovery plan in case of a single domain controller failure. The latter cause’s failure in login and authentication. First, you need to verify if the problem is caused by the network or corruption of the AD (Rommel... recovery and...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic CIS256 U2 Project for FREE!

Contact Us