Preview

Unit 8 Assignment 1

Satisfactory Essays
Open Document
Open Document
320 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 8 Assignment 1
An important improvement that was added in Windows Vista was the removable media policies. It allowed for the use of USB drives, flash memory cards, external USB hard drives, and CD/DVD writers. These however posed a huge security problem for companies because it allowed the users to easily copy data from their systems, or even place unwanted viruses or malware onto their network. This lead to a lot of companies removing or just destroying these devices so that they wouldn’t work on their workstations.
Vista also addressed the power management settings that weren’t available by default in Windows operation systems beforehand. There were third party software that was used before this release, but companies would prefer if it were built into Windows to reduce costs. Power management policies allowed the companies to save money on electricity, and run at lower temperatures.
Hard disk settings were added which allowed the hard drive to be set to turn on or off at specific times. For example when the computer is on battery power, then the hard drive would power down. The other policy that was added for this is for when the computer is plugged in. These allowed for set time values to be set after inactivity or other events happen which would power down the hard drives. There were also settings for the displays which worked the same way as the hard drives.
A very useful policy that is called “Require a password when a computer wakes” was added. This made it easier for companies to keep their networks secure. Everyone knows that not all employees and other users log off or lock their computers before walking away to go on break or something. With this setting, after the computer went into a sleep state then when it wakes, the user will have to input their credentials again to verify that they are who they say they are.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 10 Assignment 1

    • 344 Words
    • 2 Pages

    * The onsite updates the responsibility of the onsite IT team, and ultimately the IT supervisor. The responsibility of the restore includes the same people plus the OK from management. All parties need to be kept updated with current…

    • 344 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 3 Assignment 1

    • 128 Words
    • 1 Page

    Do you have a DNS Server set up with your company? If so, what kind?…

    • 128 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 10 Assignment 1

    • 469 Words
    • 3 Pages

    For this video, I have learned the name of the process I have used to repair applications.…

    • 469 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Unit 2 Assignment 2

    • 676 Words
    • 3 Pages

    1. Microsoft is aware that research was published at a security conference proving a successful attack against X.509 digital certificates signed using the MD5 hashing algorithm. This attack method could allow an attacker to generate additional digital certificates with different content that have the same digital signature as an original certificate. The MD5 algorithm had previously shown a vulnerability, but a practical attack had not yet been demonstrated.…

    • 676 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 8 Assignment 1

    • 349 Words
    • 1 Page

    IP route: One entry in an IP routing table that lists some potential destination (usually a network ID or subnet ID) as forwarding instructions, including the interface out which the router should forward the IP packet.…

    • 349 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Assignment 1

    • 261 Words
    • 2 Pages

    2. A pretest loop is a loop tests the conditions before performing the iteration. A posttest loop performs the iteration then test the condition.…

    • 261 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. Deactivate all CD, DVD, and USB ports; then enable an automatic antivirus scan for the CD’s, DVD’s, and USB ports to prevent any harmful, or malicious files that may be on the drives.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Unit 3 Assignment 1

    • 375 Words
    • 2 Pages

    1. Research the following organizations and explain their involvement with the Internet public IP addresses:…

    • 375 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    unit 3 assignment 4

    • 4187 Words
    • 14 Pages

    It is not only individuals in the consumer marketplace that have the potential to buy, as buyers also exist in the business to business market. B2B markets are individuals that have the responsibility of purchasing on behalf of the business. Cadbury have both individual and business to business consumers. They trade with all major supermarkets and superstores, but also sell to local and private shops. This way they can broaden their distribution and reach customers and consumers everywhere.…

    • 4187 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    unit 3 assignment 3

    • 854 Words
    • 3 Pages

    1. Which of the following is true about a TCP/IP network? A) The network uses only standards defined in TCP/IP RFCs.…

    • 854 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    NT1110Module4 SA

    • 302 Words
    • 1 Page

    The New Technology File system also provides support for the larger hard drives and better security in the form of encryption and permissions that restrict access by unauthorized users. It allows administrators to set a guideline for people who can access certain files and folders. It also allows administrators to set up specific accounts with limits for each person to tighten the security.…

    • 302 Words
    • 1 Page
    Good Essays
  • Good Essays

    Microsoft licensed its operating system more cheaply to computer makers such as Dell and Compaq, if they exclusively installed its software.…

    • 640 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    unit 3 assignment 1

    • 269 Words
    • 2 Pages

    What does RAID stand for? A Redundant array of independent disks uses two or more drives in combination to create a fault-tolerant system that protects against physical hard drive failure and increase hard drive performance.…

    • 269 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Mot1431 Teaching Case 1

    • 690 Words
    • 3 Pages

    The emergence of Microsoft as dominant personal computer operating system provider was mainly due to the interest in strategic management of the softwares, to enhance the profits and to achieve dominance in the market of computer software. Alongwith this, the market dominance competition between Macintosh and IBM, played a vital role in enhancement of Microsoft software development. The major factors that influenced the Microsoft’s dominance include;      …

    • 690 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Computer Storage Devices

    • 576 Words
    • 2 Pages

    Computer Storage Devices Storage devices are used in order to store various items such as programs, data and instructions. Storage was used as early as 1804 by hole punching paper cards in order to control machinery. Without storage, the computer programs and files that exist now would not be possible. There are many different devices used for storage today such as hard drives, floppy drives and CD-Rom drives.…

    • 576 Words
    • 2 Pages
    Good Essays