Preview

Unit 1 Assignment 1 Installing Roles as a Batch File

Powerful Essays
Open Document
Open Document
394 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 1 Assignment 1 Installing Roles as a Batch File
Installing Server Roles with a Batch File
Zachary Taylor (11641395)
I.T.T Technical Institute

Email and Web Services
Mr. Semreen
September 24, 2013 After careful consideration it was decided by the IT corporate team that in order to increase security and lower your attack surface, Windows 2008 server core would be installed on a group of your servers. However, a few roles need to be installed on the server and your senior Administrator is not familiar with installing roles on a server core machine. The /W switch specifies the warning level of the MIDL compiler. The warning level indicates the severity of the warning. It also behaves the same as the /Warn switch. There are different levels of this and can be used to determine how severe a problem may be. Below I have made a chart listing the different /W levels. As for removing a role, if needed you can remove a singular role quite easily. For example if you want to remove the single role ExampleRole1. All you have to do is enter “Remove-ManagementRole ExampleRole1” There are different types of removals for different purposes. When starting DHCP service from command prompt simplify enter “net start dhcpserver, net stop dhcpserver, net pause dhcpserver, or net continue dhcpserver. Or you can get there by clicking Start>Settings>Control Panel>double-click Administrative Tools, and then double-click DHCP. As for DNS zone, you are able to configure it manually through various steps or using your command prompt and entering “dnscmd /Config {|..AllZones} {1|0}”
Warning level

Description
Example
W0
No warnings.

W1
Severe warnings that can cause application errors.
No binding handle specified, unattributed pointers, conflicting switches.
W2
May cause problems in the user's operating environment
Identifier length exceeds 31 characters. No default union arm specified.
W3
Reserved.

W4
Lowest warning level.
Non-ANSI C constructs.
Open Microsoft Word

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 1 Case Study

    • 776 Words
    • 4 Pages

    The server roles and features that would be recommended for the company are as follows:…

    • 776 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Nt1110 Unit 3 Assignment

    • 655 Words
    • 3 Pages

    Server side code will include the portion of opening a socket on a specific port as discussed earlier and in addition to it there will be some if-else construct or a switch case implementation that will interpret the incoming instructions from the client ma-chine and will call the related method associated with the in-struction…

    • 655 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    RBOCS stands for Regional Bell Operating Companies. These seven companies were established after an antitrust suit against AT&T. It split the company into seven regional companies that handle local exchange service. They are also known as “Baby Bells.” These companies handled almost all of the telephone services across the country.…

    • 258 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    lower your attack surface, Windows 2008 Server Core would be installed on a group of your servers.…

    • 235 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Yes, it is worth setting up DHCP for two, five, or even twenty five computers as long as the computer has a newer operating system to support it. Dynamic Host Configuration Protocol is an important protocol that lets network administrators manage centrally and automate the assignment of IP configurations on a computer network. The way DHCP works is that the DHCP server receives the request, assigns a new address for a specific time period and sends it to the client. I think setting up DHCP for your computers is worth doing because it has its advantages over manual configuration. These advantages include that each computer gets its configuration from a "pool" of available numbers automatically for a specific time period meaning no wasted numbers. Domain Name System (DNS) A hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities. Most prominently, it translates easily memorized domain names to the numerical IP addresses needed for the purpose of locating computer services and devices worldwide.…

    • 185 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    The purpose of the first application is to demonstrate that you can control many things from a distance instead of being at the actual location of the object. You can do this from a different location using the internet or onsite using the Local Area Network. This is done by connecting the object be it a nuclear power plant or a simple light bulb to a computer. Via the internet this can then be controlled from a far location. The equipment we used to perform this demonstration are a light, bell, relay, Data Acquisition device, and a computer that has the correct software installed. The local area network we set up on the main computer (the server) would bridge the way for operating the object from a distant location using the internet. We showed this by turning a light and a bell on and off using the computer directly connected to them (the server) and from another computer using the Internet.…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Assignment

    • 365 Words
    • 2 Pages

    Research an IT product or product line that has been impacted by either the ADA or Section 508. This could be a single product, or it could show the evolution of a product line to more in compliance with the above laws. You will need to show how the product or product line has been impacted by the law(s), what impact that has been, and how the company has adjusted.…

    • 365 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2670 Lab1 2

    • 1472 Words
    • 7 Pages

    The classroom network consists of Windows Server 2008 student servers and the ServerDC connected to a local area network. ServerDC, the domain controller for the contoso##.com domain, is running Windows Server 2008. Throughout the labs in this manual, you will install, configure, maintain, and troubleshoot application roles, features, and services on the same student server.…

    • 1472 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 2207 Words
    • 9 Pages

    This paper gives an idea regarding the important aspects of the database security. It mainly focuses on the security parameters such as confidentiality, authenticity and availability of the data. It also explains the different threats for the security in an organization in relation to the database. The basic steps which are required to control the loss of data are explained in detail. Among the controls the encryption process is the one which has to be followed to control the access into an…

    • 2207 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    It-260 Worksheet

    • 512 Words
    • 3 Pages

    In the future, you will need to configure your server to perform certain tasks, using tools and services that Windows Server 2008 does not install by default. In this exercise, use the Server Manager console to configure the server and install these tools and services.…

    • 512 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Mgmt901 Unit 1 Assignment

    • 2072 Words
    • 9 Pages

    MGMT901 Teacher Feedback on essay 2 UoW ID for assignment author......student username................ Company........ANZ............................ Name of marker.......Mary Barrett...........………………… Essay number..............2..............................…

    • 2072 Words
    • 9 Pages
    Best Essays
  • Powerful Essays

    It 260 Quiz 1-5

    • 1413 Words
    • 6 Pages

    Which of the following is a true statement about the number of roles a Windows Server 2008 computer can support?…

    • 1413 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Nf1 Unit 1 Assignment

    • 115 Words
    • 1 Page

    How are things going at Banner Heath? Did you have another crazy Halloween party like last year? Oh, by the way, did you get extra work from the security incident?…

    • 115 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Assignment

    • 80 Words
    • 1 Page

    In the unit 1 assignment, we defined the relations and keys for a library system. In unit 2 we learned about constraints. For your unit 2 assignment, identify and describe the constraints that would be appropriate for the relations that we have within our library system. Constraints that you should consider may include:…

    • 80 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Assignment

    • 579 Words
    • 3 Pages

    1. Cancer is a group of diseases in which cells grows and divide out of control, it is caused by a change in DNA that controls the cell cycle. This DNA change causes for cells not to stay in interphase for the normal amount of time, and some of the checkpoints fail and cause the cells to divide uncontrollably. The uncontrollable division rate can create a massive group of cells called a tumour. The cells of the tumour may stay together and have no other effect on the tissues around it, this is known as a benign tumour. There is also a tumour known as a malignant tumour, which causes interference with functioning of neighbouring cells and tissues. Malignant tumours could even destroy surrounding tissues, but malignant…

    • 579 Words
    • 3 Pages
    Satisfactory Essays

Related Topics