A+ Guide to IT Technical Support (Hardware and Software) (MindTap Course List)
9th Edition
ISBN: 9781305266438
Author: Jean Andrews
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Concept explainers
Expert Solution & Answer
Chapter 17, Problem 2TC
Explanation of Solution
Given:
Accounting Department.
Excel workbook.
File Server.
Administrator.
Folders.
To find: The first and the second-best step to recover an error which is occurring while attempting to save a workbook file to the hard drive.
Solution:
User needs to save the workbook of the file to hard ...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
You have been hired as a consultant for a new company with 35 users. You have determined they should use Windows Server 2019 with Windows 10 clients. One of the servers will provide centralized authentication and use Group Policy. Which of the following is a crucial question that you must answer before you can install these features on this server?
a. What file sharing protocol should be used?
b. What domain name should you use?
c. What folders need to be shared?
d. What CPU are the client computers using
You have an application that will securely share files hosted in Azure Blob storage to external users. The external users will not use Azure AD to authenticate.You plan to share more than 1,000 files.You need to restrict access to only a single IP address for each file.What should you do?
1
Configure a storage account firewall.
Generate a service SAS that include the signedIP field.
Set the Allow public anonymous access to setting for the storage account.
Set the Secure transfer required setting for the storage account.
Task 1: Demonstrate how to install some user and system applications such as firefox, and Dolphin file manager) is user applications and (nmap, and conky) as administrator applications.
Task 2: Install, configure Samba service and demonstrate how to connect to your server from remote computer.
Task 3: Install, configure Web Server and demonstrate how to browse a simple website hosted in your server. You may deploy a simple website (or web application) – from the Internet, in your server.
Task 4: Install, configure FTP Server and demonstrate how to browse files hosted in your server.
Chapter 17 Solutions
A+ Guide to IT Technical Support (Hardware and Software) (MindTap Course List)
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- In Lab 3: Enabling Windows Active Directory and User Access Controls, you’ll create users and groups in Windows Active Directory, create folders to be accessed by the users, and set permissions on the folders. Then you’ll modify the Windows Group Policy to enable each new user account to use remote desktop services to access a remote server. Finally, you'll test the security measures you implementing by using the new user accounts to access and modify the foldersarrow_forward2. On your Windows 10 Platform, create a new user called “Win10”, with Administrative rights. The account should be password protected. Choose 3 security questions of your choice in case you forget your password. Instructions: - Provide all necessary steps to accomplishing the task above.- Upon successful completion, provide screenshots of your created user account, together with the security questions.arrow_forwardDiego has the Windows 10 Home edition installed on his personal laptop. As an avid gamer, he prefers having his computer update with the latest feature updates from Microsoft. He usually plays games at specific times, and he wants to prevent his computer from restarting to install an update during these time slots. Which of the following Windows Update settings should Diego modify? a. View update history b. Change active hours c. Pause updates for 7 days d. Download updates over metered connectionsarrow_forward
- You have shared a folder on a Windows server and set permissions. What do you need to do next to ensure users can access the share? -Nothing, the share can be accessed -Configure the host firewall rules to allow SMB -Configure the host firewall rules to allow ping packets -Configure the host firewall rules to allow file and printer sharingarrow_forwardWhat are. bat files? Explain the commands.Create a network folder on desktop and make a text document into .bat file?Execute minimum 5 commands either inside .bat file or cmd.Attach screen shots of 5 commands.arrow_forwardYou work as an IT support technician for a boss who believes you are really bright and can solve just about any problem he throws at you. Folks in the company have complained one time too many that the file server downtime is just killing them, so he asks you to solve this problem. He wants you to figure out what hardware is needed to implement hardware RAID for fault tolerance. You check the file server’s configuration and discover it has a single hard drive using a SATA connection with Windows Server 2016 installed. There are four empty bays in the computer case and four extra SATA power cords. You also discover an empty PCIe ×4 slot on the motherboard. BIOS/UEFI setup does not offer the option to configure RAID, but you think the slot might accommodate a RAID controller. Complete the investigation and do the following: Decide what hardware you must purchase and save or print webpages showing the products and their cost. What levels of RAID does the RAID controller card support?…arrow_forward
- Discuss three tools used for Windows Backup and Restore using the text, Internet, and/or your job as reference for full creditarrow_forwardYou work as a PC technician for a local insurance company and your boss believes you are really bright and can solve just about any problem he throws at you. Employees in the company have complained one too many times that the file server downtime is hurting their jobs and productivity. Your boss wants you to figure out what hardware is needed to implement hardware RAID for fault tolerance. You check the file server's configuration and discover it has a single hard drive using a SATA connection with Windows Server 2012 installed. There are four empty bays in the computer case and four extra SATA power cords. You also discover an empty PCIe x 4 slot on the motherboard. BIOs setup does not have a built in RAID option. Research what RAID is and what it does if you do not remember what was covered in TestOut. Write at least 2 paragraphs about RAID and it's different functions. Decide what will need to be purchased and provide links to the items that must be purchased to make this…arrow_forwardYour Windows 2016 domain is setup to control security and access. When would you allow users to have access to their local computer at an administrative level? When might this not be appropriate? Do you feel that there are any security issues from allowing this to occur? Why or why not?arrow_forward
- You are configuring sharing options for the Public folder on a Windows 10 computer. In Advanced sharing settings in the Network and Sharing Center, you enable the option Turn on sharing so that anyone with network access can read and write files in the Public folders.Which one of the following is a valid observation if you choose the option Turn on password protected sharing? Question options: You can restrict access to the shared Public folder to valid user accounts, but you cannot select which user accounts have access. Anyone can access the information in the Public folder, even if they do not have a valid user account on the sharing computer. Network users can access the shared folder by using a local user account and not a domain user account. Network users do not need to sign in to the sharing computer to access the contents of the Public folder.arrow_forwardKesha spends time analyzing datasets that are larger than 1 TB in job as a data scientist. This data is stored in databases on her Windows 10 system. While running an analysis on these databases, she does not want her code to be slowed down because of real-time scanning by Windows Defender.Which of the following settings should Kesha modify to solve this problem? a Exclusions b Tamper protection c Notifications d Cloud-based protectionarrow_forwardHow does FileVault encryption work in MacOS, and what are the advantages and potential drawbacks of using it to secure your data?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- A+ Guide To It Technical SupportComputer ScienceISBN:9780357108291Author:ANDREWS, Jean.Publisher:Cengage,LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.Computer ScienceISBN:9781337569798Author:ECKERTPublisher:CENGAGE L
A+ Guide To It Technical Support
Computer Science
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:Cengage,
LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
Computer Science
ISBN:9781337569798
Author:ECKERT
Publisher:CENGAGE L