Based on your Week Three Learning Team Collaboration discussion, write a 1- to 2-page technical document on how files and folders are protected on Wadley, Inc.’s network. This will become part of the final install, configuration, and support plan for Wadley, Inc.
Include the installation and management of printers, disk management, physical drive options, redundancy, and disk backup plan.
Explain how Group Policy will be utilized.
Format according to APA guidelines.
Submit your assignment to the Assignment Files tab.
Learning Team Collaboration: Wadley, Inc., Windows® Installation, Configuration, and Support Plan
Complete Exercises 1, 2, and 3 within the Practice Lab this week titled, “Create Group Policy Objects”.
Complete Exercises 1, 2, and 3 within the Practice Lab this week titled, “Configure Security Policies”.
Complete Exercise 2 within the Practice Lab this week titled, “Configure Windows Firewall”.
Take screenshots of the steps that you completed to finish each of the above exercises.
Paste your screenshots into a Microsoft® Word document.
Write a 1-page summary of how you would use the information and skills learned in the Practice Labs as a Network Administrator.
Submit the assignment to the Assignment Files tab.
You will be making a digital rolodex using a doubly linked list. Your program will have the following criteria:
1. Each node in the list will contain the following information about the person:
2. When the program opens it will read contact information from a text file and create a doubly linked list with the information.
3. The user will be able to:
o search for and display specific user by any piece of information. Exact matches only is fine. Should be able to navigate through a list if there are multiple results. thus, you probably want to sort first.
o add a contact to the rolodex
o delete a user from the rolodex
o sort the rolodex by any piece of information and navigate through it, displaying one contact at a time. (they will need to be able to exit this navigation mode)
o quit the program.
4. Upon quitting, all contact information should be written back to the text file.