Chat with us, powered by LiveChat Submit a comprehensive document incorporating all components of the milestones, supported by a brief presentation of the implementation process for the provided components of an operating s | Wridemy

Submit a comprehensive document incorporating all components of the milestones, supported by a brief presentation of the implementation process for the provided components of an operating s

Submit a comprehensive document incorporating all components of the milestones, supported by a brief presentation of the implementation process for the provided components of an operating system upgrade plan. The audience is your Help Desk staff and interns. Using the scenario given, describe the implementation tasks for the operating system upgrade and provide documentation of the implementation to inform the Help Desk staff and interns. 

Overview The final project for this course is an operating system upgrade implementation brief, containing three deliverables (a written report, an information assurance presentation, and web-technology tutorials) to illustrate implementation of provided components of an operating system upgrade plan. Using the given scenario, you will complete the implementation tasks as described for the operating system upgrade. 

Course Outcomes  Assess the capabilities of basic computer networks in terms of scope and scale for their ability to address enterprise needs  Modify basic behaviors in computer programs to meet specified criteria  Employ fundamental practices for data storage and data retrieval systems that inform appropriate management of data within an enterprise  Manipulate basic web technologies for optimal use and function  Analyze fundamental components of information assurance practices to maximize the security of enterprise systems. 

Your final project will address the following scenario: You are a new employee at an IT help desk. The organization that you work for has computers that are due for an operating system (OS) upgrade. Your supervisor has provided you with tasks needed to facilitate a smooth upgrade process. You will use the provided elements to explain and illustrate the implementation of an operating system upgrade. You will write a report design a presentation and create two brief tutorials.

Specifically, the following critical elements must be addressed:

Written Report: 

I. Using the provided coding, determine modifications to the code in order to communicate to employees about the pending operating system upgrade through a display on their desktop computer screen. 

A. Identify five components of the code, indicating their role in programming. Be sure to address all five components. 

B. Modify existing code to generate a new message to employees that informs them of the anticipated date for the upgrade. Use screenshots to illustrate the working code before and after modification. 

C. Describe the changes made and why they were necessary. 

II. Using the provided illustration of the network configuration for the organization, give a detailed description of the computer network. The description will be used by Help Desk staff to provide necessary support to employees. 

A. Network Configuration – Explanation: Describe the configuration of the network, explaining the role of each component and connection. 

B. Network Configuration – Evaluation: Describe the critical components that may be missing from the diagram, which are necessary for a network to function properly. Provide a rationale for including the missing critical configuration components, based on the function of each missing component. 

C. Describe how the network could be modified to address enterprise considerations. Consider modifications for increasing efficiency, scalability, or expansion capabilities.

III. Using the provided database, create a database report and modify the appropriate components with information regarding the employees’ computers and upgrade dates. Then, run the associated query to produce a report for Help Desk staff to aid them when communicating with employees. 

A. Database Examination: For each table in the database, compare the datasheet view with the design view. Make sure to describe what each table contains and any data types other than text. 

B. Database Modification: Select the correct table and modify this table by creating a new data field with the appropriate data type required. Then enter the appropriate upgrade information based on group number. Describe the steps you have taken to make these alterations. 

C. Database Query: Run the appropriately named query and describe what data is being pulled. Discuss the links established between tables within the query. How do the linkages between tables affect the ability to pull correct data? Explain. Screenshots may be used to support your claims.

Information Assurance Presentation: 

IV. Prepare a three-slide presentation explaining information assurance needs, including risks associated with non-adherence to processes, and countermeasures to mitigate risks. 

A. Information Assurance: Provide a description (one slide) of information assurance and associated needs for this upgrade 

B. Risks: Explain the risks associated with non-adherence to information assurance processes (one slide) in this scenario 

C. Countermeasures: Describe specific ways to address and mitigate risks associated (one slide). 

Web-Technology Tutorials: V. Prepare two one-page web-technology tutorials for setting the company website as the homepage and for enabling and disabling cookies. 

A. Homepage: Create a one-page tutorial for setting the company website as the homepage for newly updated computers. Make sure to indicate web browser specifications. 

B. Cookies: Create a one-page tutorial for enabling and disabling cookies, including web browser specifications.

                                                                    Milestones

Milestone One: Programming Report In Module Two, you will prepare and submit a report with the provided code modified to display a new message to the employees informing them about the operating system upgrade. This milestone is graded with the Milestone One Rubric. 

Milestone Two: Networking and Database Reports In Module Five, you will prepare networking and database reports for the scenario provided. For the networking report, describe the network configuration, explaining the role of each component and connection, following the diagram provided by your supervisor. Write a short description of any components you think are missing from the network diagram and provide a potential rationale of why you think these components are critical to the network. Specifically, state the functions of the components and how they contribute to the network. For the database report, modify the appropriate components of the provided database with the information regarding the employees’ computers and the upgrade. The table containing the date of each computer’s upgrade should be updated upon completion of this upgrade. The query identifying each employee’s upgrade date should be run. This will serve as the type of report that would be given to Help Desk staff to communicate with employees. This milestone is graded with the Milestone Two Rubric.

Milestone Three: Information Assurance and Web Technologies Communications In Module Seven, you will submit a three-slide presentation explaining information assurance needs, including risks associated with non-adherence to processes and describing countermeasures to mitigate risks, and two one-page tutorials for setting the company website as the homepage and for enabling and disabling cookies. This milestone is graded with the Milestone Three Rubric. 

Final Submission: Operating System Upgrade Implementation Brief In Module Nine, you will submit your operating system upgrade implementation brief. This should be a complete, polished artifact containing all of the deliverables (written report, information assurance presentation, and web-technology tutorials). The final submission should reflect the incorporation of feedback received and will be graded using the Final Product Rubric.

Guidelines for Submission: Written components of the project must follow these formatting guidelines when applicable: double spacing, 12-point Times New Roman font, and one-inch margins. APA style referencing. 

See attached supporting documents/milestones submitted. and final project rubric.                   

ALEXANDER APANYIN

SNHU

IT-505-Q3521 CORE TECHNOLOGIES 23TW3

MILESTONE THREE: SETTING THE COMPANY WEBSITE AS THE HOMEPAGE

MARCH 2023

TUTORIAL 1

SETTING THE COMPANY WEBSITE AS THE HOMEPAGE

Objective: This tutorial demonstrates steps to set up their company’s website as their Google Chrome web brewer’s homepage.

Steps:

1. The first step is to launch the Google Chrome browser.

2. When the browser runs, click the three in the upper-right corner.

3. From the drop-down menu, select “Setting.”

4. In the "On startup" section, select "Open a specific page or set of pages.”

5. Click on the button “Add a new page.

6. In the field provided, enter the URL for your company.

7. Click "Add.”

8. Click on the three dots next to the company website URL.

9. From the drop-down menu, select "Make default."

10. Close the Settings tab.

Disabling Cookies:

To disable cookies, follow the following steps.

Steps:

1. The first step is to launch the Google Chrome browser.

2. When the browser runs, click the three in the upper-right corner.

3. From the drop-down menu, select “Options.”

4. Click on "Privacy & Security" in the left-hand menu.

5. Uncheck the box next to "Accept cookies and site data from websites,” Under the" Cookies and Site Data" section,

6. Close the Options tab.

TUTORIAL 2

SETTING THE COMPANY WEBSITE AS THE EMPLOYEES' HOMEPAGE

Objective: This tutorial will show you how to set the company website as the homepage in the Microsoft Edge web browser.

Steps:

1. Launch the Microsoft Edge web browser.

2. On the browser’s upper-right corner, click the three dots.

3. Select "Settings" in the menu.

4. In the "Open Microsoft Edge with" section, select "A specific page or pages.”

5. The “Add a new page” button appears. Click it.

6. In the field provided, enter the URL for your company.

7. Click "Add".

8. Click on the three dots next to the company website URL.

9. Select "Make start page" from the drop-down menu.

10. Close the Settings tab.

,

ALEXANDER APANYIN

SNHU

IT-505-Q3521 CORE TECHNOLOGIES 23TW3

MILESTONE TWO: NETWORKING AND DATABASE REPORT

MARCH 2023

Network Configuration refers to all communication designs within a network, which involves organizing hardware and software in a particular manner to achieve optimal performance. According to Techopedia (2019), a network configuration is a comprehensive process of configuring a network's controls, flow, and operation to support an organization's or network owner's communication needs. The all-encompassing term involves various processes of configuring and setting up the hardware, software, and other supporting equipment and components. The arrangement of hardware and software in a specific way based on this layout results in maximum efficiency. The network configuration involves a combination of hardware and software, where the hardware acts as a foundation for the network. The design can be limited to a local area or multiple locations worldwide.

The diagram below illustrates the organization's local network configuration based on a server-oriented network.

Fig.A: Network diagram

Diagram, timeline  Description automatically generated

Server Based Networks

Large companies often prefer server-based networks as it is an ideal solution. A central server is established to store all the company's data in this network type. The central server gives access to authorized users and determines their access level. In addition, the data can be shared among users, and a backup is created on the server. This type of network is recommended when multiple users require access to server-based resources.

Figure A illustrates how the internet is connected to various departments and how data flows between different departments. Each network component plays a significant role in maintaining the data flow.

Internet/Cloud

"Cloud" is a term often used to describe the internet. Within the network diagram presented, the cloud refers to the Wide Area Network (WAN) available within the organization. A public or private WAN with a national or global reach can exist. The cloud serves as a reference point for the transfer of data, which may originate through one Internet Service Provider (ISP) or various ISPs. (Davis, 2019).

Routers

This device plays a vital role in a packet-switched network, such as the internet; sometimes, it can function as computer software. It determines the destination network point to the data packet that should be sent and acts as the first line of defense against network invasion. Routers are connected to other networks and select the direction of information packet transmission based on the present state of the connected networks. Routers connected to other network devices are typically connected through cables, and drivers are not required to operate in Windows or other operating systems (Fisher, 2019). They often function as Dynamic Host Configuration Protocol (DHCP) servers, particularly in smaller networks, and provide particular IP addresses.

Firewalls

This acts as a protective barrier between two networks and safeguards one from another. Per Cisco's definition, a firewall is a security device for monitoring incoming and outgoing network traffic and deciding whether to allow or block specific traffic based on specific security rules. A firewall acts as a protective barrier between two networks, guarding one network against another. It safeguards private networks in many businesses, and most firewalls offer data encryption to secure data traffic. (Cisco, 2019). For most companies, a firewall protects the private network from the public or shared network to which it is connected. Additionally, many firewalls offer encryption services to protect data traffic.

Servers

The server configuration involves a server responding to user or client requests. The server’s primary function is to provide access to users and employees, sharing data or software resources among them. Depending on the need, various servers exist, including database, game, and web servers. These servers are often regarded as the "brains" of network devices because they perform critical functions in managing the network's resources (Mitchell, 2018, p. 2).

Ethernets

The ethernet is the most widely used local area network (LAN) technology, which sets the wiring and signaling standards for the physical layer of TCP/IP. It falls under the Link Layer protocol within TCP/IP, which allows data to be sent or received between network devices on the same network segment. This is the standard means of connecting other devices, including computers, routers, and printers, over wired connections (Brand Media, 2018). In Ethernet connectivity, widgets search for available time slots to communicate within the network. Then, if no device is transmitting information, the waiting device can send the data.

Printers

A printer is a device that receives textual or graphical output from a computer and prints it onto paper. In the diagram above, all network devices, including departmental computers, are connected to the printer via an Ethernet link. The printer prints the data requested by any user in the respective departments (Rouse, 2016).

Other Components that should be included in the network.

Modems

The modem converts data from the analog form used on telephone lines to a digital format used on computers. While they are commonly used for connecting to the internet, they also have many applications in the corporate world, such as data transfer, remote management, and broadband backup. For example, remote management involves installing a modem at a prime location, allowing a particular application to be controlled or handled remotely without needing a physical visit. This can save a company time and money. Figure B shows the modem.

Fig.B: Modem

A picture containing text  Description automatically generated

Network switches

This device connects different network devices using packet switching to send, receive, and process data to its intended devices. Advantageously, it forwards data to specific devices that require it rather than broadcasting to all other devices. This feature ensures that data is kept secure within an organization and is shared only among employees based on their access level. Fig. C. shows a network switch.

Fig.C: Network switch

Database Reports

The database provided has four tables, which include Computer Information. In a regular view, this table displays computer ID, employee ID, location, and whether the computer requires advanced software. The Design view reveals the data type for the computer and employee IDs in numbers.

Another table is Employee Information, which in regular view shows employee ID, last name, first name, office number, job title, and personal mobile number. The Design view shows that the data type for mobile numbers is currently in short text format but can be changed to number data type and saved.

The third table, Job Title, lists various job titles assigned to employees. Again, the job title data type is a short text in the Design view.

The fourth table, Upgrade Information, in the Design view shows that the data type for Upgrade Date is currently Text.

Since this data type is not suitable for a date and time format, it should be changed to Date/Time and saved. Then, in regular view, the column named "Upgrade Date" should be selected, and the dates of upgrading the OS for each group should be entered. After entering the dates, the data should be saved, and the table should be closed.

Figure 4 shows the updated Upgrade Information Table and the OS update dates for different groups.

Fig. D: Updated Information Table

Table  Description automatically generated

Design view of the table

Fig. E: Design views of the upgrade updated table.

Graphical user interface, application, table, Excel  Description automatically generated

This table highlights the primary focus on the employee ID in Employee Information and the Computer ID in both Computer Information and Upgrade Information. By examining the table, one can gather various pieces of information, including the computer ID of the system scheduled for an update, the date of the update, the group number to which it belongs, and the name and ID of the employee using the system.

References

Cisco. (2019). What Is a Firewall? Retrieved from Cisco: https://www.cisco.com/c/en/us/products/security/firewalls/what-is-a-firewall.html.

Davis, Z. (2019). Encyclopedia: Definition of Cloud. Retrieved from PCMag Digital Group: https://www.pcmag.com/encyclopedia/term/39847/cloud.

Fisher, T. (2019, April 5). What Is a Router and How Does it Work? Retrieved from Lifewire:

https://www.lifewire.com/what-is-a-router-2618162

Linksys. (2018). What is a Modem? Retrieved from Linksys:

https://www.linksys.com/us/r/resource-center/what-is-a-modem/

Mitchell, B. (2018, December 14). Servers Are the Heart of the Internet. Retrieved from

Lifewire: https://www.lifewire.com/servers-in-computer-networking-817380

Rouse, M. (2016, September). Printer. Retrieved from WhatIs.com:

https://whatis.techtarget.com/definition/printer

image5.png

image1.jpeg

image2.png

image3.jpeg

image4.png

,

ALEXANDER APANYIN

SNHU

IT-505-Q3521 CORE TECHNOLOGIES 23TW3

Milestone One: Programming Report

FEB 2023

Introduction

This report details the modifications made to the JavaScript code provided to display a message to employees regarding the upcoming operating system upgrade. The modifications were made to inform employees about the upgrade and to ensure a smooth upgrade process in each department. The code has been broken down into five components and each component's role in the programming process is explained. The code has been modified to display the days left until the upgrade for each group, starting from Group 1 with an initial upgrade date set at least 30 days in the future. The subsequent upgrade dates for Groups 2-5 have been set at 2, 5, 8, and 10 days after the initial upgrade date respectively. Screenshots have been included to support the changes made to the code.

Five components of the code that are significant are:

i. var today = new Date();: This line of code creates a new Date object that represents the current date and time.

ii. var upgradeDay = new Date("January 19, 2015");: This line of code creates a new Date object that represents a specific date. In this case, it's the date of the operating system upgrade.

iii. var msPerDay = 24 * 60 * 60 * 1000;: This line of code calculates the number of milliseconds in a day.

iv. var timeLeft = (upgradeDay.getTime() – today.getTime());: This line of code calculates the time difference between the current date and the upgrade date.

v. var daysLeft = Math.floor(days);: This line of code rounds down the number of days left until the upgrade to the nearest integer.

Pieces of code to be modified

1. Initial upgrade date that is at least 30 days in the future:

var initialUpgradeDate = new Date();

initialUpgradeDate.setDate(initialUpgradeDate.getDate() + 30);

2. Assigning dates for the other remaining groups:

var group2UpgradeDate = new Date(initialUpgradeDate);

group2UpgradeDate.setDate(group2UpgradeDate.getDate() + 2);

var group3UpgradeDate = new Date(initialUpgradeDate);

group3UpgradeDate.setDate(group3UpgradeDate.getDate() + 5);

var group4UpgradeDate = new Date(initialUpgradeDate);

group4UpgradeDate.setDate(group4UpgradeDate.getDate() + 8);

var group5UpgradeDate = new Date(initialUpgradeDate);

group5UpgradeDate.setDate(group5UpgradeDate.getDate() + 10);

3. Displaying massage to the employee

document.write("Your computer upgrade schedule:<br><br>");

document.write("Group 1: " + initialUpgradeDate.toDateString() + "<br>");

document.write("Group 2: " + group2UpgradeDate.toDateString() + "<br>");

document.write("Group 3: " + group3UpgradeDate.toDateString() + "<br>");

document.write("Group 4: " + group4UpgradeDate.toDateString() + "<br>");

document.write("Group 5: " + group5UpgradeDate.toDateString() + "<br>");

Code and Output Screenshots

Code screenshot

Text  Description automatically generated

Output screenshot

Text, letter  Description automatically generated

image1.png

image2.png

,

IT 505 Final Project Guidelines and Rubric

Overview The final project for this course is an operating system upgrade implementation brief, containing three deliverables (a written report, an information assurance presentation, and web-technology tutorials) to illustrate implementation of provided components of an operating system upgrade plan. Using the given scenario, you will complete the implementation tasks as described for the operating system upgrade.

Course Outcomes  Assess the capabilities of basic computer networks in terms of scope and scale for their ability to address enterprise needs

 Modify basic behaviors in computer programs to meet specified criteria

 Employ fundamental practices for data storage and data retrieval systems that inform appropriate management of data within an enterprise

 Manipulate basic web technologies for optimal use and function

 Analyze fundamental components of information assurance practices to maximize the security of enterprise systems

Prompt Your final project will address the following scenario: You are a new employee at an IT help desk. The organization that you work for has computers that are due for an operating system (OS) upgrade. Your supervisor has provided you with tasks needed to facilitate a smooth upgrade process. You will use the provided elements to explain and illustrate the implementation of an operating system upgrade. You will write a report design a presentation and create two brief tutorials.

Specifically, the following critical elements must be addressed:

Written Report: I. Using the provided coding, determine modifications to the code in order to communicate to employees about the pending operating system upgrade

through a display on their desktop computer screen. A. Identify five components of the code, indicating their role in programming. Be sure to address all five components. B. Modify existing code to generate a new message to employees that informs them of the anticipated date for the upgrade. Use screenshots to

illustrate the working code before and after modification. C. Describe the changes made and why they were necessary.

II. Using the provided illustration of the network configuration for the organization, give a detailed description of the computer network. The description will be used by Help Desk staff to provide necessary support to employees.

A. Network Configuration – Explanation: Describe the configuration of the network, explaining the role of each component and connection.

B. Network Configuration – Evaluation: Describe the critical components that may be missing from the diagram, which are necessary for a network to function properly. Provide a rationale for including the missing critical configuration components, based on the function of each missing component.

C. Describe how the network could be modified to address enterprise considerations. Consider modifications for increasing efficiency, scalability, or expansion capabilities.

III. Using the provided database, create a database report and modify the appropriate components with information regarding the employees’ computers and upgrade dates. Then, run the associated query to produce a report for Help Desk staff to aid them when communicating with employees.

A. Database Examination: For each table in the database, compare the datasheet view with the design view. Make sure to describe what each table contains and any data types other than text.

B. Database Modification: Select the correct table and modify this table by creating a new data field with the appropriate data type required. Then enter the appropriate upgrade information based on group number. Describe the steps you have taken to make these alterations.

C. Database Query: Run the appropriately named query and describe what data is being pulled. Discuss the links established between tables within the query. How do the linkages between tables affect the ability to pull correct data? Explain. Screenshots may be used to support your claims.

Information Assurance Presentation: IV. Prepare a three-slide presentation explaining information assurance needs, including risks associated with non-adherence to processes, and

countermeasures to mitigate risks. A. Information Assurance: Provide a description (one slide) of information assurance and associated needs for this upgrade B. Risks: Explain the risks associated with non-adherence to information assurance processes (one slide) in this scenario C. Countermeasures: Describe specific ways to address and mitigate risks associated (one slide)

Web-Technology Tutorials: V. Prepare two one-page web-technology tutorials for setting the company website as the homepage and for enabling and disabling cookies.

A. Homepage: Create a one-page tutorial for setting the company website as the homepage for newly updated computers. Make sure to indicate web browser specifications.

B. Cookies: Create a one-page tutorial for enabling and disabling cookies, including web browser specifications.

Milestones Milestone One: Programming Report In Module Two, you will prepare and submit a report with the provided code modified to display a new message to the employees informing them about the operating system upgrade. This milestone is graded with the Milestone One Rubric.

Milestone Two: Networking and Database Reports In Module Five, you will prepare networking and database reports for the scenario provided. For the networking report, describe the network configuration, explaining the role of each component and connection, following the diagram provided by your supervisor. Write a short description of any components you

think are missing from the network diagram and provide a potential rationale of why you think these components are critical to the network. Specifically, state the functions of the components and how they contribute to the network. For the database report, modify the appropriate components of the provided database with the information regarding the employees’ computers and the upgrade. The table containing the date of each computer’s upgrade should be updated upon completion of this upgrade. The query identifying each employee’s upgrade date should be run. This will serve as the type of report that would be given to Help Desk staff to communicate with employees. This milestone is graded with the Milestone Two Rubric.

Milestone Three: Information Assurance and Web Technologies Communications In Module Seven, you will submit a three-slide presentation explaining information assurance needs, including risks associated with non-adherence to processes and describing countermeasures to mitigate risks, and two one-page tutorials for setting the company website as the homepage and for enabling and disabling cookies. This milestone is graded with the Milestone Three Rubric.

Final Submission: Operating System Upgrade Implementation Brief In Module Nine, you will submit your operating system upgrade implementation brief. This should be a complete, polished artifact containing all of the deliverables (written report, information assurance presentation, and web-technology tutorials). The final submission should reflect the incorporation of feedback received and will be graded using the Final Product Rubric.

Deliverables

Milestone Deliverables Module Due Grading

One Programming Report Two Graded separately; Milestone One Rubric

Two Networking and Database Reports Five Graded separately; Milestone Two Rubric

Three Information Assurance and Web Technologies Communications

Seven Graded separately; Milestone Three Rubric

Final Product: Operating System Upgrade Implementation Brief

Nine Graded separately; Final Product Rubric

Final Product Rubric Guidelines for Submission: Written components of the project must follow these formatting guidelines when applicable: double spacing, 12-point Times New Roman font, and one-inch margins.

Critical Elements Exemplary Proficient Needs Improvement Not Evident Value

Code: Components Meets “Proficient” criteria and applies appropriate IT terminology in explanation

(100%)

Comprehensively explains the programming role for the five identified components in the code

(90%)

Explains the programming role for the five identified components in the code, but explanation lacks clarity or includes inaccuracies (70%)

Does not explain the programming role for five components in the code

(0)%

6

Code: Modification Correctly modifies existing code to generate a new message displayed through screenshots, illustrating the code before and after modification (100%)

Modifies existing code, but code is inaccurate or modifications are not illustrated through screenshots

(70%)

Does not modify the

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

About Wridemy

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Hire a tutor today CLICK HERE to make your first order

Related Tags

Academic APA Writing College Course Discussion Management English Finance General Graduate History Information Justify Literature MLA