Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Linux Implementation Proposal

Linx, LLC. has a new research and development group - LSDG. All systems in LSDG will run the Linux operating system and will access resources, as well as share resources, with Linx, LLC.'s Microsoft Active Directory domain. The domain consists of several Windows Server 2012 R2 servers running various services (Microsoft Active Directory, DNS, DHCP, web services, printing and file services).

Linx, LLC. also has around 500 client operating system desktops/laptops that run Windows 7 and Windows XP. There is a mix of desktop and laptop systems.

Current Desktop/Laptop Configuration for Windows 7:
Processor: Intel Core i3 Second Generation
Memory: 4GB RAM
Hard Drive: 350GB
Network Card: 10/100/1000 Mbps
USB Ports: 4 USB 2.0
Monitor: 20inch LCD

Current Desktop/Laptop Configuration for Windows XP:
Processor: Intel Core 2
Memory: 2GB RAM
Hard Drive: 80GB
Network Card: 10/100 Mbps
USB Ports: 4 USB 2.0
Monitor: 15inch LCD

Your boss wants you to come up with a proposal to replace all Windows XP systems with Linux. You will implement the Linux variant specified by your instructor.

Requirements

The final submission should contain at least 5 to 7 pages' worth of text written by the student (not counting title page, images, diagrams, tables, or quotations that may be used), but may be longer, not to exceed approximately 7 pages' worth of student-supplied text. It must be double-spaced, have 1-inch margins, and use 12-point Times New Roman or 10-point Arial/Helvetica font. A title page is required.

You must turn this assignment to both the assignment area within our LEO classroom as well as to the TurnItIn website. Failure to do so may result in point deductions. Follow the TurnItIn instructions provided within the class.

You must address the following in your proposal and may make any assumptions which are not specified:

• Research and justify whether LSDG will use existing computer hardware that is being used with the Windows XP systems, or if new hardware will be required.

• Plan for migration from Windows XP to Linux.

• Determine the hardware to be used and the installation options.

• How will users log onto the systems? Explain.

• How will systems receive IP addresses? Explain.

• How will DNS be accessed by the LSDG systems? Explain.

• Explain how files on the network may be accessed by LSDG.

• Explain how LSDG can securely share files within their group and other selected groups/users in the company.

• How will printing be handled? Explain.

• What, if any, data will be encrypted? Explain.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M91965841

Have any Question?


Related Questions in Management Information System

Using proper apa formatting write an initial 400-600 word

Using proper APA formatting write an initial 400-600 word discussion paper relating to the following: 1. What are protective barriers and what should they entail? 2. What mitigation procedures can be used to ensure the r ...

Answer the following questions 1 discuss in 500 words how

Answer the following Questions : 1) Discuss in 500 words, how much redaction is necessary to anonymize an electronic health record. Is it enough to redact the name? The name and address? Is a medical record like a finger ...

Ethics and information managementusing campbellsville

Ethics and Information Management Using Campbellsville University library and/or other sources, read at least four (4) academically reviewed articles on the ethical issues that may arise in information management. Please ...

Need answers to the below questions 12 - 1 page each

Need Answers to the below Questions (1/2 - 1 page each answer) This is of the assigned textbook "Wharton Managing Emerging Technologies" Q1: Clarify any 2 of the variable evaluation approaches for future markets and emer ...

Respond to the following questions about the security

Respond to the following questions about the security development model, and address the following: Select 1 major component of the model, and describe the key elements. Discuss the importance of this component in the se ...

Topic we all had the unfortunate experience of seeing how

Topic: We all had the unfortunate experience of seeing how computers can, at times, make life's journey abit more difficult. This is especially true in knowledge centric workplaces. Describe an example of a very poorly i ...

A crucial starting point to develop an effective disaster

A crucial starting point to develop an effective disaster recovery plan is to cultivate an efficient Business Impact Analysis (BIA). The BIA evaluates the potential effect of interruptions to an organization's critical b ...

Exercise 73 filling the human gapyou work for a medium

Exercise 7.3: Filling the Human Gap You work for a medium seized manufacturing company that has a well developed DR plan. The plan is well tested and the testing has revealed a serious personnel gap During a recovery, ke ...

Question social engineering techniques are often used to

Question : Social Engineering techniques are often used to trick users into giving out important information. List two of the recommendations from the OER readings for avoiding social engineering attacks and briefly desc ...

Discussion 1security support responsibilities please

Discussion : 1. "Security Support Responsibilities" Please respond to the following: • Imagine you are the CIO of an organization. Construct an outline of four ongoing responsibilities that the digital forensics personne ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As