Submit a comprehensive document incorporating all components of the milestones, supported by a brief presentation of the implementation process for the provided components of an operating s
Submit a comprehensive document incorporating all components of the milestones, supported by a brief presentation of the implementation process for the provided components of an operating system upgrade plan. The audience is your Help Desk staff and interns. Using the scenario given, describe the implementation tasks for the operating system upgrade and provide documentation of the implementation to inform the Help Desk staff and interns.
Overview The final project for this course is an operating system upgrade implementation brief, containing three deliverables (a written report, an information assurance presentation, and web-technology tutorials) to illustrate implementation of provided components of an operating system upgrade plan. Using the given scenario, you will complete the implementation tasks as described for the operating system upgrade.
Course Outcomes Assess the capabilities of basic computer networks in terms of scope and scale for their ability to address enterprise needs Modify basic behaviors in computer programs to meet specified criteria Employ fundamental practices for data storage and data retrieval systems that inform appropriate management of data within an enterprise Manipulate basic web technologies for optimal use and function Analyze fundamental components of information assurance practices to maximize the security of enterprise systems.
Your final project will address the following scenario: You are a new employee at an IT help desk. The organization that you work for has computers that are due for an operating system (OS) upgrade. Your supervisor has provided you with tasks needed to facilitate a smooth upgrade process. You will use the provided elements to explain and illustrate the implementation of an operating system upgrade. You will write a report design a presentation and create two brief tutorials.
Specifically, the following critical elements must be addressed:
Written Report:
I. Using the provided coding, determine modifications to the code in order to communicate to employees about the pending operating system upgrade through a display on their desktop computer screen.
A. Identify five components of the code, indicating their role in programming. Be sure to address all five components.
B. Modify existing code to generate a new message to employees that informs them of the anticipated date for the upgrade. Use screenshots to illustrate the working code before and after modification.
C. Describe the changes made and why they were necessary.
II. Using the provided illustration of the network configuration for the organization, give a detailed description of the computer network. The description will be used by Help Desk staff to provide necessary support to employees.
A. Network Configuration – Explanation: Describe the configuration of the network, explaining the role of each component and connection.
B. Network Configuration – Evaluation: Describe the critical components that may be missing from the diagram, which are necessary for a network to function properly. Provide a rationale for including the missing critical configuration components, based on the function of each missing component.
C. Describe how the network could be modified to address enterprise considerations. Consider modifications for increasing efficiency, scalability, or expansion capabilities.
III. Using the provided database, create a database report and modify the appropriate components with information regarding the employees’ computers and upgrade dates. Then, run the associated query to produce a report for Help Desk staff to aid them when communicating with employees.
A. Database Examination: For each table in the database, compare the datasheet view with the design view. Make sure to describe what each table contains and any data types other than text.
B. Database Modification: Select the correct table and modify this table by creating a new data field with the appropriate data type required. Then enter the appropriate upgrade information based on group number. Describe the steps you have taken to make these alterations.
C. Database Query: Run the appropriately named query and describe what data is being pulled. Discuss the links established between tables within the query. How do the linkages between tables affect the ability to pull correct data? Explain. Screenshots may be used to support your claims.
Information Assurance Presentation:
IV. Prepare a three-slide presentation explaining information assurance needs, including risks associated with non-adherence to processes, and countermeasures to mitigate risks.
A. Information Assurance: Provide a description (one slide) of information assurance and associated needs for this upgrade
B. Risks: Explain the risks associated with non-adherence to information assurance processes (one slide) in this scenario
C. Countermeasures: Describe specific ways to address and mitigate risks associated (one slide).
Web-Technology Tutorials: V. Prepare two one-page web-technology tutorials for setting the company website as the homepage and for enabling and disabling cookies.
A. Homepage: Create a one-page tutorial for setting the company website as the homepage for newly updated computers. Make sure to indicate web browser specifications.
B. Cookies: Create a one-page tutorial for enabling and disabling cookies, including web browser specifications.
Milestones
Milestone One: Programming Report In Module Two, you will prepare and submit a report with the provided code modified to display a new message to the employees informing them about the operating system upgrade. This milestone is graded with the Milestone One Rubric.
Milestone Two: Networking and Database Reports In Module Five, you will prepare networking and database reports for the scenario provided. For the networking report, describe the network configuration, explaining the role of each component and connection, following the diagram provided by your supervisor. Write a short description of any components you think are missing from the network diagram and provide a potential rationale of why you think these components are critical to the network. Specifically, state the functions of the components and how they contribute to the network. For the database report, modify the appropriate components of the provided database with the information regarding the employees’ computers and the upgrade. The table containing the date of each computer’s upgrade should be updated upon completion of this upgrade. The query identifying each employee’s upgrade date should be run. This will serve as the type of report that would be given to Help Desk staff to communicate with employees. This milestone is graded with the Milestone Two Rubric.
Milestone Three: Information Assurance and Web Technologies Communications In Module Seven, you will submit a three-slide presentation explaining information assurance needs, including risks associated with non-adherence to processes and describing countermeasures to mitigate risks, and two one-page tutorials for setting the company website as the homepage and for enabling and disabling cookies. This milestone is graded with the Milestone Three Rubric.
Final Submission: Operating System Upgrade Implementation Brief In Module Nine, you will submit your operating system upgrade implementation brief. This should be a complete, polished artifact containing all of the deliverables (written report, information assurance presentation, and web-technology tutorials). The final submission should reflect the incorporation of feedback received and will be graded using the Final Product Rubric.
Guidelines for Submission: Written components of the project must follow these formatting guidelines when applicable: double spacing, 12-point Times New Roman font, and one-inch margins. APA style referencing.
See attached supporting documents/milestones submitted. and final project rubric.
ALEXANDER APANYIN
SNHU
IT-505-Q3521 CORE TECHNOLOGIES 23TW3
MILESTONE THREE: SETTING THE COMPANY WEBSITE AS THE HOMEPAGE
MARCH 2023
TUTORIAL 1
SETTING THE COMPANY WEBSITE AS THE HOMEPAGE
Objective: This tutorial demonstrates steps to set up their company’s website as their Google Chrome web brewer’s homepage.
Steps:
1. The first step is to launch the Google Chrome browser.
2. When the browser runs, click the three in the upper-right corner.
3. From the drop-down menu, select “Setting.”
4. In the "On startup" section, select "Open a specific page or set of pages.”
5. Click on the button “Add a new page.
6. In the field provided, enter the URL for your company.
7. Click "Add.”
8. Click on the three dots next to the company website URL.
9. From the drop-down menu, select "Make default."
10. Close the Settings tab.
Disabling Cookies:
To disable cookies, follow the following steps.
Steps:
1. The first step is to launch the Google Chrome browser.
2. When the browser runs, click the three in the upper-right corner.
3. From the drop-down menu, select “Options.”
4. Click on "Privacy & Security" in the left-hand menu.
5. Uncheck the box next to "Accept cookies and site data from websites,” Under the" Cookies and Site Data" section,
6. Close the Options tab.
TUTORIAL 2
SETTING THE COMPANY WEBSITE AS THE EMPLOYEES' HOMEPAGE
Objective: This tutorial will show you how to set the company website as the homepage in the Microsoft Edge web browser.
Steps:
1. Launch the Microsoft Edge web browser.
2. On the browser’s upper-right corner, click the three dots.
3. Select "Settings" in the menu.
4. In the "Open Microsoft Edge with" section, select "A specific page or pages.”
5. The “Add a new page” button appears. Click it.
6. In the field provided, enter the URL for your company.
7. Click "Add".
8. Click on the three dots next to the company website URL.
9. Select "Make start page" from the drop-down menu.
10. Close the Settings tab.
,
ALEXANDER APANYIN
SNHU
IT-505-Q3521 CORE TECHNOLOGIES 23TW3
MILESTONE TWO: NETWORKING AND DATABASE REPORT
MARCH 2023
Network Configuration refers to all communication designs within a network, which involves organizing hardware and software in a particular manner to achieve optimal performance. According to Techopedia (2019), a network configuration is a comprehensive process of configuring a network's controls, flow, and operation to support an organization's or network owner's communication needs. The all-encompassing term involves various processes of configuring and setting up the hardware, software, and other supporting equipment and components. The arrangement of hardware and software in a specific way based on this layout results in maximum efficiency. The network configuration involves a combination of hardware and software, where the hardware acts as a foundation for the network. The design can be limited to a local area or multiple locations worldwide.
The diagram below illustrates the organization's local network configuration based on a server-oriented network.
Fig.A: Network diagram
Server Based Networks
Large companies often prefer server-based networks as it is an ideal solution. A central server is established to store all the company's data in this network type. The central server gives access to authorized users and determines their access level. In addition, the data can be shared among users, and a backup is created on the server. This type of network is recommended when multiple users require access to server-based resources.
Figure A illustrates how the internet is connected to various departments and how data flows between different departments. Each network component plays a significant role in maintaining the data flow.
Internet/Cloud
"Cloud" is a term often used to describe the internet. Within the network diagram presented, the cloud refers to the Wide Area Network (WAN) available within the organization. A public or private WAN with a national or global reach can exist. The cloud serves as a reference point for the transfer of data, which may originate through one Internet Service Provider (ISP) or various ISPs. (Davis, 2019).
Routers
This device plays a vital role in a packet-switched network, such as the internet; sometimes, it can function as computer software. It determines the destination network point to the data packet that should be sent and acts as the first line of defense against network invasion. Routers are connected to other networks and select the direction of information packet transmission based on the present state of the connected networks. Routers connected to other network devices are typically connected through cables, and drivers are not required to operate in Windows or other operating systems (Fisher, 2019). They often function as Dynamic Host Configuration Protocol (DHCP) servers, particularly in smaller networks, and provide particular IP addresses.
Firewalls
This acts as a protective barrier between two networks and safeguards one from another. Per Cisco's definition, a firewall is a security device for monitoring incoming and outgoing network traffic and deciding whether to allow or block specific traffic based on specific security rules. A firewall acts as a protective barrier between two networks, guarding one network against another. It safeguards private networks in many businesses, and most firewalls offer data encryption to secure data traffic. (Cisco, 2019). For most companies, a firewall protects the private network from the public or shared network to which it is connected. Additionally, many firewalls offer encryption services to protect data traffic.
Servers
The server configuration involves a server responding to user or client requests. The server’s primary function is to provide access to users and employees, sharing data or software resources among them. Depending on the need, various servers exist, including database, game, and web servers. These servers are often regarded as the "brains" of network devices because they perform critical functions in managing the network's resources (Mitchell, 2018, p. 2).
Ethernets
The ethernet is the most widely used local area network (LAN) technology, which sets the wiring and signaling standards for the physical layer of TCP/IP. It falls under the Link Layer protocol within TCP/IP, which allows data to be sent or received between network devices on the same network segment. This is the standard means of connecting other devices, including computers, routers, and printers, over wired connections (Brand Media, 2018). In Ethernet connectivity, widgets search for available time slots to communicate within the network. Then, if no device is transmitting information, the waiting device can send the data.
Printers
A printer is a device that receives textual or graphical output from a computer and prints it onto paper. In the diagram above, all network devices, including departmental computers, are connected to the printer via an Ethernet link. The printer prints the data requested by any user in the respective departments (Rouse, 2016).
Other Components that should be included in the network.
Modems
The modem converts data from the analog form used on telephone lines to a digital format used on computers. While they are commonly used for connecting to the internet, they also have many applications in the corporate world, such as data transfer, remote management, and broadband backup. For example, remote management involves installing a modem at a prime location, allowing a particular application to be controlled or handled remotely without needing a physical visit. This can save a company time and money. Figure B shows the modem.
Fig.B: Modem
Network switches
This device connects different network devices using packet switching to send, receive, and process data to its intended devices. Advantageously, it forwards data to specific devices that require it rather than broadcasting to all other devices. This feature ensures that data is kept secure within an organization and is shared only among employees based on their access level. Fig. C. shows a network switch.
Fig.C: Network switch
Database Reports
The database provided has four tables, which include Computer Information. In a regular view, this table displays computer ID, employee ID, location, and whether the computer requires advanced software. The Design view reveals the data type for the computer and employee IDs in numbers.
Another table is Employee Information, which in regular view shows employee ID, last name, first name, office number, job title, and personal mobile number. The Design view shows that the data type for mobile numbers is currently in short text format but can be changed to number data type and saved.
The third table, Job Title, lists various job titles assigned to employees. Again, the job title data type is a short text in the Design view.
The fourth table, Upgrade Information, in the Design view shows that the data type for Upgrade Date is currently Text.
Since this data type is not suitable for a date and time format, it should be changed to Date/Time and saved. Then, in regular view, the column named "Upgrade Date" should be selected, and the dates of upgrading the OS for each group should be entered. After entering the dates, the data should be saved, and the table should be closed.
Figure 4 shows the updated Upgrade Information Table and the OS update dates for different groups.
Fig. D: Updated Information Table
Design view of the table
Fig. E: Design views of the upgrade updated table.
This table highlights the primary focus on the employee ID in Employee Information and the Computer ID in both Computer Information and Upgrade Information. By examining the table, one can gather various pieces of information, including the computer ID of the system scheduled for an update, the date of the update, the group number to which it belongs, and the name and ID of the employee using the system.
References
Cisco. (2019). What Is a Firewall? Retrieved from Cisco: https://www.cisco.com/c/en/us/products/security/firewalls/what-is-a-firewall.html.
Davis, Z. (2019). Encyclopedia: Definition of Cloud. Retrieved from PCMag Digital Group: https://www.pcmag.com/encyclopedia/term/39847/cloud.
Fisher, T. (2019, April 5). What Is a Router and How Does it Work? Retrieved from Lifewire:
https://www.lifewire.com/what-is-a-router-2618162
Linksys. (2018). What is a Modem? Retrieved from Linksys:
https://www.linksys.com/us/r/resource-center/what-is-a-modem/
Mitchell, B. (2018, December 14). Servers Are the Heart of the Internet. Retrieved from
Lifewire: https://www.lifewire.com/servers-in-computer-networking-817380
Rouse, M. (2016, September). Printer. Retrieved from WhatIs.com:
https://whatis.techtarget.com/definition/printer
image5.png
image1.jpeg
image2.png
image3.jpeg
image4.png
,
ALEXANDER APANYIN
SNHU
IT-505-Q3521 CORE TECHNOLOGIES 23TW3
Milestone One: Programming Report
FEB 2023
Introduction
This report details the modifications made to the JavaScript code provided to display a message to employees regarding the upcoming operating system upgrade. The modifications were made to inform employees about the upgrade and to ensure a smooth upgrade process in each department. The code has been broken down into five components and each component's role in the programming process is explained. The code has been modified to display the days left until the upgrade for each group, starting from Group 1 with an initial upgrade date set at least 30 days in the future. The subsequent upgrade dates for Groups 2-5 have been set at 2, 5, 8, and 10 days after the initial upgrade date respectively. Screenshots have been included to support the changes made to the code.
Five components of the code that are significant are:
i. var today = new Date();: This line of code creates a new Date object that represents the current date and time.
ii. var upgradeDay = new Date("January 19, 2015");: This line of code creates a new Date object that represents a specific date. In this case, it's the date of the operating system upgrade.
iii. var msPerDay = 24 * 60 * 60 * 1000;: This line of code calculates the number of milliseconds in a day.
iv. var timeLeft = (upgradeDay.getTime() – today.getTime());: This line of code calculates the time difference between the current date and the upgrade date.
v. var daysLeft = Math.floor(days);: This line of code rounds down the number of days left until the upgrade to the nearest integer.
Pieces of code to be modified
1. Initial upgrade date that is at least 30 days in the future:
var initialUpgradeDate = new Date();
initialUpgradeDate.setDate(initialUpgradeDate.getDate() + 30);
2. Assigning dates for the other remaining groups:
var group2UpgradeDate = new Date(initialUpgradeDate);
group2UpgradeDate.setDate(group2UpgradeDate.getDate() + 2);
var group3UpgradeDate = new Date(initialUpgradeDate);
group3UpgradeDate.setDate(group3UpgradeDate.getDate() + 5);
var group4UpgradeDate = new Date(initialUpgradeDate);
group4UpgradeDate.setDate(group4UpgradeDate.getDate() + 8);
var group5UpgradeDate = new Date(initialUpgradeDate);
group5UpgradeDate.setDate(group5UpgradeDate.getDate() + 10);
3. Displaying massage to the employee
document.write("Your computer upgrade schedule:<br><br>");
document.write("Group 1: " + initialUpgradeDate.toDateString() + "<br>");
document.write("Group 2: " + group2UpgradeDate.toDateString() + "<br>");
document.write("Group 3: " + group3UpgradeDate.toDateString() + "<br>");
document.write("Group 4: " + group4UpgradeDate.toDateString() + "<br>");
document.write("Group 5: " + group5UpgradeDate.toDateString() + "<br>");
Code and Output Screenshots
Code screenshot
Output screenshot
image1.png
image2.png
,
IT 505 Final Project Guidelines and Rubric
Overview The final project for this course is an operating system upgrade implementation brief, containing three deliverables (a written report, an information assurance presentation, and web-technology tutorials) to illustrate implementation of provided components of an operating system upgrade plan. Using the given scenario, you will complete the implementation tasks as described for the operating system upgrade.
Course Outcomes Assess the capabilities of basic computer networks in terms of scope and scale for their ability to address enterprise needs
Modify basic behaviors in computer programs to meet specified criteria
Employ fundamental practices for data storage and data retrieval systems that inform appropriate management of data within an enterprise
Manipulate basic web technologies for optimal use and function
Analyze fundamental components of information assurance practices to maximize the security of enterprise systems
Prompt Your final project will address the following scenario: You are a new employee at an IT help desk. The organization that you work for has computers that are due for an operating system (OS) upgrade. Your supervisor has provided you with tasks needed to facilitate a smooth upgrade process. You will use the provided elements to explain and illustrate the implementation of an operating system upgrade. You will write a report design a presentation and create two brief tutorials.
Specifically, the following critical elements must be addressed:
Written Report: I. Using the provided coding, determine modifications to the code in order to communicate to employees about the pending operating system upgrade
through a display on their desktop computer screen. A. Identify five components of the code, indicating their role in programming. Be sure to address all five components. B. Modify existing code to generate a new message to employees that informs them of the anticipated date for the upgrade. Use screenshots to
illustrate the working code before and after modification. C. Describe the changes made and why they were necessary.
II. Using the provided illustration of the network configuration for the organization, give a detailed description of the computer network. The description will be used by Help Desk staff to provide necessary support to employees.
A. Network Configuration – Explanation: Describe the configuration of the network, explaining the role of each component and connection.
B. Network Configuration – Evaluation: Describe the critical components that may be missing from the diagram, which are necessary for a network to function properly. Provide a rationale for including the missing critical configuration components, based on the function of each missing component.
C. Describe how the network could be modified to address enterprise considerations. Consider modifications for increasing efficiency, scalability, or expansion capabilities.
III. Using the provided database, create a database report and modify the appropriate components with information regarding the employees’ computers and upgrade dates. Then, run the associated query to produce a report for Help Desk staff to aid them when communicating with employees.
A. Database Examination: For each table in the database, compare the datasheet view with the design view. Make sure to describe what each table contains and any data types other than text.
B. Database Modification: Select the correct table and modify this table by creating a new data field with the appropriate data type required. Then enter the appropriate upgrade information based on group number. Describe the steps you have taken to make these alterations.
C. Database Query: Run the appropriately named query and describe what data is being pulled. Discuss the links established between tables within the query. How do the linkages between tables affect the ability to pull correct data? Explain. Screenshots may be used to support your claims.
Information Assurance Presentation: IV. Prepare a three-slide presentation explaining information assurance needs, including risks associated with non-adherence to processes, and
countermeasures to mitigate risks. A. Information Assurance: Provide a description (one slide) of information assurance and associated needs for this upgrade B. Risks: Explain the risks associated with non-adherence to information assurance processes (one slide) in this scenario C. Countermeasures: Describe specific ways to address and mitigate risks associated (one slide)
Web-Technology Tutorials: V. Prepare two one-page web-technology tutorials for setting the company website as the homepage and for enabling and disabling cookies.
A. Homepage: Create a one-page tutorial for setting the company website as the homepage for newly updated computers. Make sure to indicate web browser specifications.
B. Cookies: Create a one-page tutorial for enabling and disabling cookies, including web browser specifications.
Milestones Milestone One: Programming Report In Module Two, you will prepare and submit a report with the provided code modified to display a new message to the employees informing them about the operating system upgrade. This milestone is graded with the Milestone One Rubric.
Milestone Two: Networking and Database Reports In Module Five, you will prepare networking and database reports for the scenario provided. For the networking report, describe the network configuration, explaining the role of each component and connection, following the diagram provided by your supervisor. Write a short description of any components you
think are missing from the network diagram and provide a potential rationale of why you think these components are critical to the network. Specifically, state the functions of the components and how they contribute to the network. For the database report, modify the appropriate components of the provided database with the information regarding the employees’ computers and the upgrade. The table containing the date of each computer’s upgrade should be updated upon completion of this upgrade. The query identifying each employee’s upgrade date should be run. This will serve as the type of report that would be given to Help Desk staff to communicate with employees. This milestone is graded with the Milestone Two Rubric.
Milestone Three: Information Assurance and Web Technologies Communications In Module Seven, you will submit a three-slide presentation explaining information assurance needs, including risks associated with non-adherence to processes and describing countermeasures to mitigate risks, and two one-page tutorials for setting the company website as the homepage and for enabling and disabling cookies. This milestone is graded with the Milestone Three Rubric.
Final Submission: Operating System Upgrade Implementation Brief In Module Nine, you will submit your operating system upgrade implementation brief. This should be a complete, polished artifact containing all of the deliverables (written report, information assurance presentation, and web-technology tutorials). The final submission should reflect the incorporation of feedback received and will be graded using the Final Product Rubric.
Deliverables
Milestone Deliverables Module Due Grading
One Programming Report Two Graded separately; Milestone One Rubric
Two Networking and Database Reports Five Graded separately; Milestone Two Rubric
Three Information Assurance and Web Technologies Communications
Seven Graded separately; Milestone Three Rubric
Final Product: Operating System Upgrade Implementation Brief
Nine Graded separately; Final Product Rubric
Final Product Rubric Guidelines for Submission: Written components of the project must follow these formatting guidelines when applicable: double spacing, 12-point Times New Roman font, and one-inch margins.
Critical Elements Exemplary Proficient Needs Improvement Not Evident Value
Code: Components Meets “Proficient” criteria and applies appropriate IT terminology in explanation
(100%)
Comprehensively explains the programming role for the five identified components in the code
(90%)
Explains the programming role for the five identified components in the code, but explanation lacks clarity or includes inaccuracies (70%)
Does not explain the programming role for five components in the code
(0)%
6
Code: Modification Correctly modifies existing code to generate a new message displayed through screenshots, illustrating the code before and after modification (100%)
Modifies existing code, but code is inaccurate or modifications are not illustrated through screenshots
(70%)
Does not modify the
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.