Premium Essay

Unit 1 Assignment: Installing Windows 2012 (Paper)

In: Computers and Technology

Submitted By PrimeHackzLLC
Words 279
Pages 2
Installing Windows Server 2012

Installing a server is no different than installing any other operating system. For installing the windows server 2012 the first few steps would be, setting up your normal setting (if on a virtual system), which is your RAM, naming your operating system and all that good stuff. When installing on a virtual system you will need an ISO file of the operating system you’ll be installing. Once that has been done, now you’re ready to begin the basic install process. As soon as you reach the windows setup screen it begins to get a little tricky which differs from a normal operating system.
You will receive at least 4 different options to choose from depending on the O.S, both Standard and Datacenter with Core and GUI. Now you will choose which one works best for what you’re setting up. Most people choose the Datacenter with GUI because it’s the easiest to manage. On the “type of installation” page it may turn out that an upgrade look to be the right one to click but you will actually select a custom install. After the installation is done you will now have to setup a username and password. The password requires to be at least 8 characters long with a number and a capital letter. The server requests you to press “Ctrl+Alt+Del”, if you’re on a virtual system it will not work because your host computer will only receive this request. One method to this is on your virtual machine press “Ctrl”, select the right side of the screen, and then press “Del”. The installation is finished, now begin setting up your server.…...

Similar Documents

Free Essay

Mathematics B Unit 1 Paper March 2012

...Candidate Number Edexcel GCSE Mathematics B Unit 1: Statistics and Probability (Calculator) Higher Tier Friday 2 March 2012 – Afternoon Time: 1 hour 15 minutes Paper Reference 5MB1H/01 Total Marks You must have: Ruler graduated in centimetres and millimetres, protractor, pair of compasses, pen, HB pencil, eraser, calculator. Tracing paper may be used. Instructions Use black ink or ball-point pen. Fill in the boxes at the top of this page with your name, centre number and candidate number. Answer all questions. Answer the questions in the spaces provided – there may be more space than you need. Calculators may be used. If your calculator does not have a button, take the value of to be 3.142 unless the question instructs otherwise. Information The total mark for this paper is 60 The marks for each question are shown in brackets – use this as a guide as to how much time to spend on each question. Questions labelled with an asterisk (*) are ones where the quality of your written communication will be assessed. Advice Read each question carefully before you start to answer it. Keep an eye on the time. Try to answer every question. Check your answers if you have time at the end. Turn over P40619A ©2012 Pearson Education Ltd. *P40619A0120* 6/6/6/3 GCSE Mathematics 2MB01 Formulae: Higher Tier You must not write on this formulae page. Anything you write on this formulae page will gain NO credit. 1 Area of trapezium = 2 (a + b)h a cross......

Words: 1448 - Pages: 6

Premium Essay

Unit 1 Assignment 1

...Unit 1 Assignment 1 1. Describe the role of software for computers: Computer software tells the hardware what to do. Without any software, the hardware would be worthless. Think of the software as a subject in school, and the hardware as you or your brain. Without any learning, you can't do anything. One you have learned some math, and then you are able to solve math problems. This learning is usually accomplished through downloads or CD's that are loaded into the computer. At the very basic level, computer software contains specific instructions for how to accomplish a specific task. These instructions tell the hardware exactly what to do, and how to do it 2. Identify the hardware associate with a computer: the physical components that make up a computer system. There are many different kinds of hardware that can be installed inside, and connected to the outside, of a computer. Here are some common individual computer hardware components that you'll often find inside a modern computer case: Motherboard, Central Processing Unit (CPU), Random Access Memory (RAM), Power Supply Video Card, Hard Drive (HDD), Solid-State Drive (SSD), Optical Drive (e.g. BD/DVD/CD drive) Card Reader (SD/SDHC, CF), etc. Here is some common hardware that you might find connected to the outside of a computer: Monitor, Keyboard, and Mouse 3. Describe how computer store data: it converts the request into binary digits and its stores the data in a database. As a table format. The binary data can......

Words: 324 - Pages: 2

Free Essay

Unit 1 - Assignment 1 - Windows 2008 Network Services

...Unit 1 - Assignment 1 - Windows 2008 Network Services If you have a routed local area network and high-speed links that are fairly reliable, you might be able to use one DNS server for a larger, multiple sub-netted network area. If you have a high number of client nodes on a single subnet design, you might want to add more than one DNS server to the subnet to provide backup and failover if the preferred DNS server stops responding. When determining the number of DNS servers you need to use, assess the effect of zone transfers and DNS query traffic on slower links in your network. Although DNS is designed to help reduce broadcast traffic between local subnets, it does create some traffic between servers and clients that should be reviewed, particularly when used in complexly routed LAN or WAN environments. Consider the effects of zone transfer over slower speed links, like those typically used for a wide area network (WAN) connection. Although the DNS Server service supports incremental zone transfers and DNS clients and servers can cache recently used names, traffic considerations are sometimes still an issue, particularly when DHCP leases are shortened and, as a result, dynamic updates in DNS are performed more frequently. One option for dealing with remote locations on WAN links is to set up a DNS server at these locations to provide caching-only DNS service. With most installations, you should have at least two server computers hosting each of your DNS zones for fault......

Words: 413 - Pages: 2

Free Essay

Unit 1 Research Paper

...Michael Malate June 23, 2013 SP2520 Unit 1 Research Assignment 1: Exploring Programming Languages From the looks of it there seems to be 14 different revisions of the SQL standard. * SQL Server version 1.0: SQL Server version 1.0 is a 16 bit server modeled in the year 1989 for supporting OS/2. * SQL Server version 1.1: SQL Server version 1.1 is also a 16 bit server designed in the year 1991 to support OS/2. * SQL Server version 4.2: SQL Server version 4.2 was released in the year 1992. SQL 4.2 is bundled with IBM OS/2 1.3 version. * SQL Server version 4.21: In the year 1993, Microsoft server 4.21 came into existence. SQL 4.21 was the first version of SQL Server that supports Windows NT. * SQL Server version 6.0: In 1995, SQL Server version 6.0 was introduced. After Windows NT, Sybase and Microsoft parted and worked on their individual design. SQL Server version 6.0 was the chief version aimed in provision of Windows NT by Microsoft. * SQL Server version 6.5: SQL Server version 6.5 got released in the year 1996. * SQL Server version 7.0: SQL Server version 7.0 was the rewritten version from Sybase legal code. The code name of SQL Server version 7.0 is Sphinx. SQL Server version 7.0 was introduced in 1998. In 1999, SQL Server version 7.0 with OLAP tools came into site. * SQL Server version 8.0 / SQL Server version 2000: SQL Server version 2000 was the first one made of IA-64 architecture. Several advancements have been made in SQL Server......

Words: 1606 - Pages: 7

Premium Essay

Network Topology Paper Assignment 1 Unit 3

...Network Topology Paper Assignment 1 Unit 3 Mr. Swailes The study of Network Topology recognizes 8 basic topologies * Point to point * Star * Bus * Mesh * Tree * Hybrid * Daisy chain * Ring Point to point- The simplest topology is the permanent link between two end points Star-in a local area network with a star topology. Each network host is connected to a central hub with a point-to-point connection to a central node called a hub or switch. Bus- In local area networks where Bus Topology is used, each computer is connected to a single Bus cable. A signal from the source travels in both directions to all machines connected on the Bus cable until it finds the intended recipient. If the machine address does not match the intended address for the data, the machine ignores it. However, if the data matches it is accepted. The bad part of this topology is that it has a single point of failure which is the cable and if this happens the whole network can shut down. Mesh-is a fully connected network in which each node is connected to each other. A fully connected network does not need to use switching or broadcasting. However its major disadvantage is that the number of connections grows with the number of nodes. It is extremely impractical for large networks. A two node network is technically a fully connected network. Tree-is a combination of a Bus and Star topology. It is arranged to look like a tree. The advantages are it is......

Words: 641 - Pages: 3

Premium Essay

Unit 3. Assignment 1. Network Topology Paper

...Unit 3. Assignment 1. Network Topology Paper Hierarchical layout defines how the network topology is structured physically and logically. In physical topology all devices and components are placed in various locations depending on the layout. Logical topology is the flow of data throughout the layout. There are many variations of network topologies that can be implemented. The most common network topologies are star, bus, and ring. Star topology is setup with each host connected to a central hub with a point to point connection. All workstation and other devices are connected to the central hub or switch. That switch is the server and all devices connected to it are clients. All resources must be connected to a central device in order for it to be a star topology. Data that travels in the network passes through the central hub and causes it to act as a signal repeater. The advantages of a star topology are that it is easy to design and versatile in planting additional nodes. The major disadvantage of the star topology is that the hub becomes the single point of failure. Bus topology utilizes a single bus cable to connect each computer and the data from the source travels in both directions to all devices on the bus cable until it finds the specific client. Data is only accepted if the addresses matched up and if it doesn’t match, it’s simply ignored. The last computer connected to the bus needs to be terminated to prevent echoes in the network. Having a single line for......

Words: 396 - Pages: 2

Premium Essay

Nt1330 Unit 1 Assignment Windows 2008 Networking Services

...IP addresses for interfaces and services. With DHCP computers request IP addresses and networking parameters automatically from a DHCP server, reducing the need for a network administrator or a user from having to configure these settings manually. * RRAS (Routing and Remote Access Service) * Routing and Remote Access Service (RRAS) is a Microsoft API and server software that makes it possible to create applications to administer the routing and remote access service capabilities of the operating system, to function as a network router. Developers can also use RRAS to implement routing protocols. The RRAS server functionality follows and builds upon the Remote Access Service (RAS) in Windows NT 4.0.[1] RRAS was introduced with Windows 2000 and offered as a download for Windows NT 4.0. * Network Access Protection (NAP) * Network Access Protection (NAP) is a Microsoft technology for controlling network access of a computer host based on system health of the host. With Network Access Protection, system administrators of an organization's computer network can define policies for system health requirements. Examples of system health requirements are whether the computer has the most recent operating system updates installed, whether the computer has the latest version of the anti-virus software signature, or whether the computer has a host-based firewall installed and enabled....

Words: 306 - Pages: 2

Premium Essay

Unit 1 Assignment 1

...Tina Nunez NT1330 Unit 1. Assignment 1 Windows 2008 Network Services Domain name system (DNS) is a naming service used on any device that can connect to the internet. It translates fully qualified domain names of websites into IP addresses for the device. There are DNS records such as address (A, AAAA) records, name server (NS) records and mail exchanger (MX) records stored in the DNS server. Regardless of how many hosts, the DNS is a system that is very important. Dynamic host configuration protocol (DHCP) is a networking protocol that allows the dynamic (automatic) distribution of IP addresses to hosts on a network. If DHCP is enabled, the hosts will each receive a leased IP address that is chosen by the DHCP server from a scope chosen by the network administrators. Sometimes the administrators can reserve IP addresses if needed. Depending on the amount of hosts, it could determine if the IT management wants to use DHCP. If the company is very small, it may not be worth the effort to set up a DHCP server. It can still work but static (manual) IP addresses would be simple to configure because there would be very few devices compared to a large company. Some of the vital devices will usually use static IP addresses anyway such as any servers. If there is a very large company, it would be extremely beneficial to use DHCP. All of the devices can automatically pick up an IP as soon as they connect to the network and the network administrators do not have to go to each and...

Words: 272 - Pages: 2

Premium Essay

Unit 3 Assignment 1

...Unit 3 Assignment 1: Compare Windows 8 and Windows RT Course Objectives and Learning Outcomes Identify the characteristics of popular mobile operating systems. Compare mobile operating systems to their related desktop operating systems. Identify the characteristics of Windows Phone. Identify differences and similarities between Windows 8 and Windows Phone 8. Assignment Requirements Research Windows 8 and Windows RT on the Microsoft website and write a paper that discusses the implications of an integrated platform. Required Resources Web browser Windows RT website http://windows.microsoft.com/en-us/windows/rt Submission Requirements Submit a one-page paper that compares Windows 8 and Windows RT. The paper should identify five similarities and five differences between the platforms. You should also discuss how an integrated platform affects users and developers. Which operating system is required for mobile application development? Why? Evaluation Criteria Category | # | Criteria | CONTENT, 90% | 1.1 | The paper should identify 5 similarities between Windows 8 and Windows RT. Up to 20 points for this element | | 1.2 | The paper should identify 5 differences between Windows 8 and Windows RT. Up to 20 points for this element | | 1.3 | The paper should discuss how an integrated platform impacts users. Up to 20 points for this element | | 1.4 | The paper should discuss how an integrated platform impacts developers. Up to 20 points for this......

Words: 283 - Pages: 2

Free Essay

Unit 1 Assignment 1

...Unit 1 Assignment 1: Integrated Circuit Technology Year | Transistor Count | Processor Model | 1971 | 2,300 | Intel 4004 | 1972 | 3,500 | Intel 8008 | 1974 | 4,500 | Intel 8080 | 1976 | 6,500 | Intel 8085 | 1978 | 29,000 | Intel 8086 | 1979 | 29,000 | Intel 8088 | 1982 | 55,000 | Intel 80186 | 1982 | 134,000 | Intel 80286 | 1985 | 275,000 | Intel 80386 | 1989 | 1,180,235 | Intel 80486 | 1993 | 3,100,000 | Pentium | 1995 | 5,500,000 | Pentium Pro | 1997 | 7,500,000 | Pentium II | 1999 | 9,500,000 | Pentium III | 2000 | 42,000,000 | Pentium 4 | 2008 | 47,000,000 | Atom | 2002 | 220,000,000 | Itanium 2 McKinley | 2006 | 291,000,000 | Core 2 Duo | 2003 | 410,000,000 | Itanium 2 Madison 6M | 2004 | 592,000,000 | Itanium 2 with 9MB cache | 2008 | 731,000,000 | Core i7 (Quad) | 2011 | 1,160,000,000 | Quad-Core + GPU Core i7 | 2010 | 1,170,000,000 | Six-Core Core i7 (Gulftown) | 2012 | 1,400,000,000 | Quad-Core + GPU Core i7 | 2006 | 1,700,000,000 | Dual-Core Itanium 2 | 2008 | 1,900,000,000 | Six-Core Xeon 7400 | 2010 | 2,000,000,000 | Quad-Core Itanium Tukwila | 2011 | 2,270,000,000 | Six-Core Core i7/8 Core Xeon E5 | 2010 | 2,300,000,000 | 8-Core Xeon Nehalem-EX | 2011 | 2,600,000,000 | 10-Core Xeon Westmere-EX | 2012 | 3,100,000,000 | 8-Core Itanium Poulson | 2012 | 5,000,000,000 | 62-Core Xeon Phi | In 2010, the processor model that was the first to have two billion transistors on its chip was known as the......

Words: 374 - Pages: 2

Premium Essay

Unit 1 Assignment 1

...Homework Unit 1 Assignment 1 1. Why is the CPU the most important component in a computer? It’s the part of the computer that runs programs. 2. What number does a bit that is turned on represent? What number does a bit that is turned off represent? A turned on bit is 1 and a turned off bit is 0. 3. What would you call a device that works with binary data? A digital device 4. What are the words that make up a high-level programming language called? Key words or reserved words 5. What are the short words that are used in assembly language called? Mnemonics 6. What is the difference between a compiler and an interpreter? A compiler translates a high-lever program into a separate machine language program; whereas, an interpreter is a program that both translates AND executes instructions in a high-level program language program. 7. What type of software controls the internal operations of the computer’s hardware? Operating systems which is a type of system software. Unit 2 Assignment 1 Short Answer 1. What does a professional programmer usually do first to gain an understanding of a problem? Works with and interviews the customer to gain an understanding of what the customer wants the program to accomplish. 2. What is a pseudocode? A “fake” code that programmers use to test their programs before executing them. 3. Computer programs typically perform what three steps? A) Input is received B) Some process......

Words: 508 - Pages: 3

Free Essay

Unit 1 Assignment 1

...Unit 1 Assignment 1 Integrated Circuit Technology A motherboard is the backbone of the personal computer, it transfers information and power to all the other components. The motherboard is the largest board inside of the computer that contains the basic input and output system that allows every component to communicate with one another. Attached to the motherboard is a chip comprised with dozens of pins called the central processing unit. Along with the CPU attached to the motherboard is the dual-inline memory modules a part of the random access memory. RAM is the most common type of memory used another type is ROM, read only memory, which stores data onto metal disc within the device. The operating system manages the hardware resources and provides a place to run programs. The last components of the personal computer are the tower and the human interface devices. The tower holds all the components that make up the computer except for the HID which are located outside of the computers tower. The main purpose of the HID’s are to help us interact with the computer, a few examples are the keyboard, mouse, monitor, video camera and speakers. You put together the Motherboard, CPU, RAM, ROM, OS, Tower, HID’s add a power supply and you have a basic personal computer. PROCESSOR TRANSISTOR YEAR Intel 4004 | 2,300 | 1971 | Intel 8008 | 3,500 | 1972 | Intel 8080 | 4,500 | 1974 | Intel 8085 | 6,500 | 1976 | ......

Words: 427 - Pages: 2

Premium Essay

Unit 1 Assignment 1 Windows 2008 Network

...Unit 1. Assignment 1. Windows 2008 Network Services Course Objectives and Learning Outcomes In this assignment, you will explain the function of DHCP and DNS. Assignment Requirements Write a 1-page report summarizing IT-management overhead in reference to DHCP and DNS. In your report, address IT-management overhead in reference to DNS and DHCP, with the following question in mind: 1. How many hosts does it take to justify the time and effort to setup a centrally managed solution for name resolution and address allocation? (In other words, is it worth setting up DHCP for two computers? 5? 25?) Consider both MS Windows Server DNS and DHCP as well as other, special use devices where DNS or DHCP may be built-in. 2. At what point should DNS or DHCP be considered a priority and require some level of redundancy? 3. Should servers use DHCP? Submission Requirements Maximum 1 page, Microsoft Word, double-spaced, 12 pt. font 1. How many hosts does it take to justify the time and effort to setup a centrally managed solution for name resolution and address allocation? (In other words, is it worth setting up DHCP for two computers? 5? 25?) Consider both MS Windows Server DNS and DHCP as well as other, special use devices where DNS or DHCP may be built-in. I believe one host is enough. In fact, if the host has a functioning network interface which is connected to a network chances are it is managed by DHCP uses DNS for name resolution.......

Words: 461 - Pages: 2

Free Essay

Unit 1 Assignment 1

...Miosha Vogt ET2560 Unit 1 Assignment 1 Chapter 1: Pg. 43 Quick- Check Exercise 1. Machine language 2. Operating System 3. Translation, Linking, Loading, Execution 4. Source 8. Software, Hardware 9. Variables 10. Secondary storage Pg. 44 Review Questions 3. Two secondary storage devices is a disk drive and flash drive Two input devices is the keyboard and mouse Two output devices is the monitor and printer 5. Syntax error is grammar error of a programming language. 6. The loader copies the executed file into memory and initiates execution of instructions. 7. Memory cells are a grouping of small units called bytes Bytes are the amount of storage required to store a single character, composed of even smaller unit called bits. Bits are binary digits 0-10. 8. Three high languages are Fortran, C, and Java FORTRAN used in scientific programming. C is used in system programming. Java supports web programming and programming Android applications. 9. Ram is volatile and it temporarily stores programs while their being executed, delete when computer is turned off, Rom is not volatile the data stored there will not disappear when the computer is turned off. 2. Write an algorithm in pseudo-code to solve the following problem: Input a temperature in Fahrenheit, and output the temperature in Celsius and Kelvin. Formulas needed are: C = ( 59 ) (F – 32). K= ( 59 ) (F – 32) + 273.15 Algorithm:......

Words: 458 - Pages: 2

Premium Essay

Unit 1 Assignment 1

...Unit 1 Assignment 1 Cell Phones use voice and data communications. It uses the voice at a lot less these days because people rarely call one another anymore. Data is used for the applications which people use more of these days. So they use a mixture of both but mainly data. Also some phone now use Wi-Fi calling so people can use data networks to call people. Landlines use voice communication. Unlike data voice can work during a black-out because it doesn’t get its power from the same and everything in your house. It’s also a cheaper technology which also makes it cheaper. SMS/Text Messaging uses data. It’s part of the reason I said Cell Phones use both. And it can only be sent over 2G and above because 1G is voice only. Fax Machines use voice. It uses the same jack and RJ-11 like landlines do. It can be used on data but traditional fax use the voice network. The fax is sent it immediately gets digitized the put back in analog form once its sent. Pagers use data. It’s almost like SMS in the is send data (words over the networks). It’s an older technology. VOIP phone use data. It’s similar to Wi-Fi calling. It breaks up in to packets and is sent over the air waves. If you used a VOIP phone you could probably hear it sounding choppy that’s because those packets were dropped for some reason or another. Skype and face time also use data. Without internet connection these applications can’t be used. The main reason these applications exist it to provide an......

Words: 330 - Pages: 2