
Database System Concepts
7th Edition
ISBN: 9780078022159
Author: Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher: McGraw-Hill Education
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Perform the following:
• Download the PA1-Create-Topology.ps1 file to the C:\Scripts folder.
• On you VMHost machine, open PowerShell Admin. (Start -> Windows PowerShell (Admin)).
• In PowerShell, enter the command below to create the network for the Performance Assessment.
a. C:\Scripts\PA1-Create-Topology.ps1
The network that is created is shown below.
PERFORMANCE ASSESSMENT INSTRUCTIONS
1) Plan IP addressing before proceeding past step 1)
a) You are assigned the IP address range of 172.15.50.0 /24 for this performance assessment.
b) GE-SERVER will host DNS.
c) PA-NAT-01 is a HyperV switch running NAT.
2) (10 pts) Perform initial startup on GE-SERVER. Set the Administrator password to Password1.
3) Rename GE-SERVER to GE-DC01.
4) Rename NIC on GE-SERVER as LAN.
5) On GE-SERVER, configure LAN NIC with your planned IP address, subnet mask, gateway, and DNS.
6) Add Active Directory Domain Services role to GE-SERVER.
a) Promote GE-SERVER to a domain controller Active Directory domain. You assigned domain name is GE.local.
7) On GE1, perform a clean install of Windows 10 from ISO (CD/DVD). Create the initial user as ecpi with the password of Password1.
8) After the install of GE1:
a) Rename NIC on GE1 as LAN.
b) On GE1, configure the IP addressing as planned above.
c) Rename GE1 computer to GE-DE01.
d) Join GE1 to your domain.
e) Stop the Windows Update service and set startup type to Manual.
f) Download and install Google Chrome web browser.
SAVE
AI-Generated Solution
info
AI-generated content may present inaccurate or offensive content that does not represent bartleby’s views.
Unlock instant AI solutions
Tap the button
to generate a solution
to generate a solution
Click the button to generate
a solution
a solution
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Given a linux file mode (permissions) as an integer, return the permission string that the mode represents. Example 1: mode = 511 511 == Ob111111111 permissons = 'rwxrwxrwx' Example 2: mode = 424 424 == ob110101000 permissions = 'rw-r-x---' def perms(mode): passarrow_forwardWinona has set up AppLocker rules to protect computers on the company network from being infected by malware. Despite this, one of the computers is infected by malware. She identifies that the malware infected the computer when a user ran a malicious .exe file. Which of the following prevented the AppLocker rules from being evaluated? a. A Path rule does not allow software to run from C:\Program Files\. b. The Windows Installer rules are not configured. c. The Executable rules are enforced and not audited. d. The Application Identity service is configured for Manual startup.arrow_forwardMay you please assist with this hypervisor powershell fill in the blankarrow_forward
- For this Assignment write a Powershell script to create a Windows user account that is a non-admin user. 1. This user must be able to login to a desktop! 2. Your script must accept an argument to set the username (eg. I should be able to run your script (Powershell.exe Execution Policy Bypass - file .\Assignment8a.ps1 "Ellie" and it should function and create a user that meets all the criteria here.) 3. Your script must first check that no user exists that already uses that name.arrow_forwardSuppose I want to copy a document to USB Flash drive Using Command in windows computer the document is located in this pc>documents>chapter12 and the user name for the computer is Zat. I have c:\user\zat> what would be rest of the command.arrow_forwardPROGRAM DESCRIPTION:In this assignment, you will write two complete C programs to support a client/server model using Linux sockets for a UDP “ping” utility, similar to the ping utility already available on our CSE machines. Servero The server program will be called with one command-line argument, the port number being used, such as ./minor4svr 8001. If the user calls the server program with too few or too many arguments, you will print out a usage statement and terminate the program.o The server will set up a UDP socket on the Internet (i.e., INET) domain and then wait in an infinite loop listening for incoming UDP packets, specifically PING messages from a client.o Packet LossUDP provides applications with an unreliable transport service. Messages may get lost in the network due to a variety of reasons. Since packet loss is rare or even non-existent in typical campus networks, the server in this lab will inject artificial loss to simulate the effects of network packet loss. The…arrow_forward
- Hi could you help me with this problem of scp connection in Linux? Let me put the question of the exercise below for you: Log in to the remote system (cntserv.hacc.edu) and begin. The password to get into this quiz can be obtained by using scp to copy a file. Do not use the -R or -r option for scp. If you do, your day will get worse. The file is located in the remote user's home directory on the remote system in a file named mod3PW The remote system has the IP 192.168.240.102. You will use the username scp with the password scp_password to scp the file. Once you have the file locally (on cntserv) you can display the contents using the cat command. THE HINTS MAY OR MAY NOT HAVE THE CORRECT PATH TO THE FILES. YOU SHOULD MAKE SURE THE COMMAND WORKS, AND NOT JUST COPY/PASTE THE HINT INTO THE ANSWER BOX. Here is what i have done, could you give step by step path to unstuck me, please? What am i doing wrong?arrow_forwardGIVEN WINDOW VM HOSTNAME : WIN-TBT4RQCAIPM UbuntuVM HOSTNAME: cse-01 On the Ubuntu VM open the command prompt substituting <ipofyourWindowsVM> by the IP of the WindowsVM and <hostnameofWindowsVM> by the Windows VM hostname, and execute the following 2 commands: 1)echo "<ipofyourWindowsVM> <hostnameofWindowsVM>" | sudo tee -a /etc/hosts . Press Enter and 2) ping<hostnameofWindowsVM>. Press Enter, (4) capture the result and include them in the Word documentarrow_forwardFor linux: what would be the command to access or view the number of bytes in the file /sys/kernel/kexec_loaded? what commands are used to retrieve the information of who is the owner of the /boot subdirectory?arrow_forward
- I'm not sure why my code keeps displaying: "* * * 1 REQUEST TIMED OUT" from a google.com host server. Is there any issues on why it seems like it is stuck in a loop? Here is my program in Python: from socket import *import socketimport osimport sysimport structimport timeimport selectimport binasciiICMP_ECHO_REQUEST = 8MAX_HOPS = 30TIMEOUT = 2.0TRIES = 2# The packet that we shall send to each router along the path is the ICMP echo# request packet, which is exactly what we had used in the ICMP ping exercise.# We shall use the same packet that we built in the Ping exercisedef checksum(str_):# In this function we make the checksum of our packetstr_ = bytearray(str_)csum = 0countTo = (len(str_) // 2) * 2for count in range(0, countTo, 2):thisVal = str_[count + 1] * 256 + str_[count]csum = csum + thisValcsum = csum & 0xffffffffcsum = (csum >> 16) + (csum & 0xff00)csum = csum + (csum >> 16)answer = ~csumanswer = answer & 0xffffanswer = answer >> 8 |…arrow_forwardDon’t copy & wrong discerption Switch C is our loser which means it will have to block its port how can effectively breaking our loop?arrow_forwardGIVEN WINDOW VM HOSTNAME : WIN-TBT4RQCAIPM UbuntuVM HOSTNAME: cse-01 On the Ubuntu VM open the command prompt substituting <ipofyourWindowsVM> by the IP of the WindowsVM and <hostnameofWindowsVM> by the Windows VM hostname, and execute the following 2 commands: 1)echo "<ipofyourWindowsVM> <hostnameofWindowsVM>" | sudo tee -a /etc/hosts . Press Enter and 2) ping<hostnameofWindowsVM>. Press Enter, (4) capture the result and include them in the Word document what is the commandsarrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education

Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education

Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON

Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON

C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON

Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning

Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education