Question? Call Us  +1 (817) 546-4770

CIS 121 Computer Information Systems

Academic Anxiety?

Get an original paper within hours and nail the task

156 experts online

Free Samples

CIS 121 Computer Information Systems

.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}

CIS 121 Computer Information Systems

0 Download6 Pages / 1,428 Words

Course Code: CIS121
University: Pierce College is not sponsored or endorsed by this college or university

Country: United States

1.Explain how Windows and Linux can work together in diverse environments.2.Recommend a configuration for your corporation that best leverages the features of each operating system. Explain your recommendation.

Overview of the company
Rouge Company has four hundred staff members with a record of producing quality work. This proposed network design for Rouge Company has considered the current network set-up of the organization.
Corporate Proposal Final
Design considerations
Before embarking in the network design, it is very important to carefully consider the scope of the design. Designers must first gather the necessary network requirements to avoid creeping of scope. This enables the designers to meet the four to six months deadline.  Other issues to consider in this design is the overall costs and infrastructure. Some of the technical issues that will be considered in this design is high availability, quality if service, security, traffic isolation, and scalability. In terms of security, the design will optimize the network security so as to accommodate the new design which will include voice and wireless security example is access control with 802.1X authentication. A scalable design so as to support Rouge construction growth and traffic isolation to reduce the heavy latency.
Recommended workstation and server requirements
For workstation, this proposal would recommend HP type of desktops with a 2 GB RAM and 180 GB hard-disk. The organization needs to install windows 10 operating systems in all the desktop as it is compatible with any application software. For the server, the organization needs to go for a minimum of 4GB RAM and a minimum hard-disk of 500 GB. The processing speed needs to be over 3Ghz. The organization needs to go for both Linux and Windows based software (Armerding, 2018).    
Storage options recommendations
As highlighted in week one, there are various storage options but Rouge Construction company need to go for both Network attached and cloud-based data storage options. With NAS option, the organization will be able to store a large amount of data that can be accessed by everyone within the organization. For cloud data storage, they can store small sets of data online that can strain off their NAS data storage option (Boddenberg, 2016)
Server Roles
Table one below summarizes server roles

Name of the server

Server Role (Purpose)

Application Server

The major purpose of the application server is to offer support to the web server, it also hosts applications used by the organization

Web Server

Process web pages for someone. The server also offers that communication between the client and the server computer using the HTTP protocol

Database server

The server is used to perform tasks such as data analysis, storage of the organization data and manipulation of data

E-mail server

With the server manage organization emails from clients and emails from employees

DHCP server

With a DHCP server, the organization user computers are able to extract their configurations from the server

DNS server

Rouge company is able to store the organization IP addresses i.e. the organization website and its corresponding hostnames

Windows and Linux integration
For full integration first, one needs to install Windows server first or windows OS first as when installing the Linux operating system, the OS is able to recognize that the Windows operating system is already installed. The second step is to make both the two platforms able to see each other under what one call identities. For the central database of the organization, one needs to go for Linux as it offers out-of-the-box tools which create and sets both the LDAP and Kerberos 5. After achieving identify integration one can now make the last step by sharing files between the two OS. With one will have fully integrated Linux and Windows (Carvalho, 2012).
User and group management
In windows, one need to enable superuser administrator for the IT department by running the command prompt and typing the commands
Net User administrator /active: yes.
To enable local groups and local users by pressing Windows + R and the typing lusrmgr.msc and then pressing enter. The command will open all the local users and the group windows. This the followed by righting and selecting properties and enabling read/write privileges. For Linux one need to change the root user using the su command or using the sudo command
Automation and rollout recommendations
The very first step is ensuring that this automation and rollout is to effectively plan before embarking on the actual design. Second, designers need to identify network requirements and determine all the required devices that the company needs. In addition, to ensure security concern, the organization needs to implement firewalls which acts as a traffic cop for networks. The device allows communication based on certain parameters. Lastly, the upper management must be willing to cooperate when required during network design and system administration (Hicks, 2016)
Group Policy, computer usage, and restriction policies
The basic rules the computer usage policy must be in place. First, the organization needs to ensure that all the electronic devices and communications are provided by the organizations and must not be used by employees for offensive messages, harassment and for games. In addition, the organization must ensure that an employee use computers on working time and if they use the computers for other reasons it is not supposed to be acceptable by the organization.
The use of computers to transmit sexually related jokes, material and pictures are prohibited within the company.  Limited personal use of computers is limited where is brief and not frequent, does not interfere with the normal running of organizational programs. It corresponds to the organizational processes and procedures and lastly it does not violate any federal laws or compromise organization system confidentiality requirements
Security guidelines
The construction company needs to focus on security needs rather than return on investment. In addition, the organization ought to develop and roll out security strategies with every employee in the organization. The first line of defense is the firewall which is able to monitor unauthorized access to the organization network. Anti-malware programs need to be installed in all the user computers. Lastly, the organization needs to install intrusion detection systems.   
Management practices
The organization management to ensure network security policies are placed and followed by the letter. The organization management ought to educate the company staff on the use of internet facilities and company email. The organization should put in place a clear and comprehensive internet usage policy which is coupled with proactive monitoring. Additionally, the organization IT leadership need to take an assertive approach to ensure the organization policies are adhered to the letter (Turnbull, Lieverdink, & Matotek, 2009) 
When things Go Wrong
System administrators are responsible for maintaining organization systems. In 2014 yahoo Company was faced with low productivity which impacted three billion user accounts. It was an attack which compromised real names, dates of births, telephone numbers, and email addresses. The company reported that in December most of the user passwords had been hashed using what the company referred to the as robust bcryot algorithm. This, in turn, results to over one billion accounts being comprised. This resulted in in estimated loss of 350 million dollars. This was as a result of poor system administration (Armerding, 2018).
For a successful administration, an organization needs to record and monitor the organization system 24 hours on a daily basis. From a technical point of view, Yahoo could have prevented the situation via monitoring memory usage, disk storage, the average response time, the SSH logins, and network throughput. From a Christian point of view, Christian Science teaches that God created everyone and anything under the sun. Human was created in God’s image and his likeness and according to Christians, this likeness reflects God’s omnipotence and goodness. If Yahoo situation was to be solved by a Christian they would be of the view that attack would have been prevented via prayers and carrying out the necessary system administration procedures such as monitoring. According to Christians before carrying out any system administration action prayers must first to pray for the action to be successful (Microsoft, 2016).  
Armerding, T. (2018, January 26th). The 17 biggest data breaches of the 21st century. Retrieved from CSO:
Boddenberg, U. B. (2016). Windows Server 2012 R2. Bonn Rheinwerk 2016.
Carvalho, L. (2012). Windows Server 2012 Hyper-V cookbook : over 50 simple but incredibly effective recipes for mastering the administration of Windows Server 2012 Hyper-V. Birminghan: Packt Pub.
Hicks, R. (2016). Configure VPN in Windows Server 2012 R2. Retrieved March 8th, 2018, from Technix:
Microsoft. (2016). Active Directory Certificate Services. Retrieved from Windows Server:
Turnbull, J., Lieverdink, P., & Matotek, D. (2009). Pro Linux system administration by James Turnbull . New York: CRS press.

Free Membership to World’s Largest Sample Bank

To View this & another 50000+ free samples. Please put
your valid email id.


Yes, alert me for offers and important updates


Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

UploadUnique Document

DocumentUnder Evaluation

Get Moneyinto Your Wallet

Total 6 pages


*The content must not be available online or in our existing Database to qualify as

Cite This Work
To export a reference to this article please select a referencing stye below:


My Assignment Help. (2021). CIS 121 Computer Information Systems. Retrieved from

“CIS 121 Computer Information Systems.” My Assignment Help, 2021,

My Assignment Help (2021) CIS 121 Computer Information Systems [Online]. Available from:[Accessed 18 December 2021].

My Assignment Help. ‘CIS 121 Computer Information Systems’ (My Assignment Help, 2021) accessed 18 December 2021.

My Assignment Help. CIS 121 Computer Information Systems [Internet]. My Assignment Help. 2021 [cited 18 December 2021]. Available from:

.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}


Thank you for your interest
The respective sample has been mail to your register email id


$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1

Account created successfully!
We have sent login details on your registered email.


Password: is the perfect solution to render quality solution for all sort of academic issues. We have hired professionals from different fields of study to provide assistance with different subjects. We successfully have provided different types of assignment solutions on 100+ subjects. We have hired industry experts to deliver nursing assignment, hr assignment and finance assignment help. To offer quality content with IT assignments, we have hired IT professionals to render programming language assignment help and IT assignment help for other types of IT assignments as well.

Latest Management Samples

div#loaddata .card img {max-width: 100%;

MPM755 Building Success In Commerce
Download :
0 | Pages :

Course Code: MPM755
University: Deakin University is not sponsored or endorsed by this college or university

Country: Australia

The process of developing a successful business entity requires a multidimensional analysis of several factors that relate to the internal and external environment in commerce. The areas covered in this current unit are essential in transforming the business perspective regarding the key commerce factors such as ethics, technology, culture, entrepreneurship, leadership, culture, and globalization (Nzelibe, 1996; Barza, 2…

SNM660 Evidence Based Practice
Download :
0 | Pages :

Course Code: SNM660
University: The University Of Sheffield is not sponsored or endorsed by this college or university

Country: United Kingdom

Critical reflection on the objective, design, methodology and outcome of the research undertaken Assessment-I
Smoking and tobacco addiction is one of the few among the most basic general restorative issues, particularly to developed nations such as the UK. It has been represented that among all risk segments smoking is the fourth driving purpose behind infections and other several ailments like asthma, breathing and problems in the l…
Australia Maidstone Management Business management with marketing University of New South Wales Masters in Business Administration 

BSBHRM513 Manage Workforce Planning
Download :
0 | Pages :

Course Code: BSBHRM513
University: Tafe NSW is not sponsored or endorsed by this college or university

Country: Australia

Task 1
1.0 Data on staff turnover and demographics
That includes the staffing information of JKL industries for the fiscal year of 2014-15, it can be said that the company is having problems related to employee turnover. For the role of Senior Manager in Sydney, the organization needs 4 managers; however, one manager is exiting. It will make one empty position which might hurt the decision making process. On the other hand, In Brisba…

MKT2031 Issues In Small Business And Entrepreneurship
Download :
0 | Pages :

Course Code: MKT2031
University: University Of Northampton is not sponsored or endorsed by this college or university

Country: United Kingdom

Entrepreneurial ventures
Entrepreneurship is the capacity and willingness to develop, manage, and put in order operations of any business venture with an intention to make profits despite the risks that may be involved in such venture. Small and large businesses have a vital role to play in the overall performance of the economy. It is, therefore, necessary to consider the difference between entrepreneurial ventures, individual, and c…
Turkey Istanbul Management University of Employee Masters in Business Administration 

MN506 System Management
Download :
0 | Pages :

Course Code: MN506
University: Melbourne Institute Of Technology is not sponsored or endorsed by this college or university

Country: Australia

An operating system (OS) is defined as a system software that is installed in the systems for the management of the hardware along with the other software resources. Every computer system and mobile device requires an operating system for functioning and execution of operations. There is a great use of mobile devices such as tablets and Smartphones that has increased. One of the widely used and implemented operating syste…
Australia Cheltenham Computer Science Litigation and Dispute Management University of New South Wales Information Technology 


Need an essay written specifically to meet your requirements?

Choose skilled experts on your subject and get an original paper within your deadline

156 experts online

Your time is important. Let us write you an essay from scratch

Tips and Tricks from our Blog

PROJ6016 Employer Based Project

Free Samples PROJ6016 Employer Based Project .cms-body-content table{width:100%!important;} #subhidecontent{ position: relative; overflow-x: auto; width: 100%;} PROJ6016 Employer

Read More »

PPMP20009 Marking Rubric

Free Samples PPMP20009 Marking Rubric .cms-body-content table{width:100%!important;} #subhidecontent{ position: relative; overflow-x: auto; width: 100%;} PPMP20009 Marking Rubric

Read More »