Preview

Windows7 Annotated Webliography

Good Essays
Open Document
Open Document
1887 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Windows7 Annotated Webliography
The annotated webliography provides an overview of relevant information in reference to Windows 7. The webliography’s source data is retrieved from various Internet resources and places emphasis on eight areas pertinent to supporting and troubleshooting Windows 7. They are: (1) installation; (2) system images; (3) hardware and applications; (4) networking; (5) resource access; (6) mobile computing; (7) monitoring and maintenance; and (8) back-up and recovery. The information below provides a high-level synopsis of relevant details retrieved from the websites.

1. Caldwell, C. (2010). Accessing local and network resources in Windows 7, Retrieved November 30, 2012, from http://technet.microsoft.com/en-us/video/accessing-local-and-network-resources-in-windows-7.aspx.

Caldwell (2010) gives an overview of information necessary to access local and network resources within the Windows 7 operating system. He outlined the critical steps using an audio-video presentation. The pertinent topics disclosed cover (1) providing file and folder permissions (2) copying and moving files and (3) encrypting files and folders using encrypting file system (EFS). These three topics are related to working with files’ system as a non-expert end-user. Taken together, the information enables end-users to better understand the benefits of integrating security in order to safeguard files and folders.

Caldwell (2010) also includes a background understanding of how to access shared resources (e.g., folders and printers), configure authentication and authorization, and implement home group and user account controls. His ability to clearly distinguish authentication and authorization eliminated confusion that these two functionalities are not synonymous.

Finally, links to download and try Windows 7 are also available at no cost. The downloads are supported by instructional videos. Therefore, the content is recommended for both the audio-video and instructional components.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    | * OS Level * Patch history Configuration hardening Desktop access, Application access * File Access * File Storage * VPN Authentication Browsing * Emails * Backups…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 1 Case Study

    • 825 Words
    • 4 Pages

    Part of managing a Windows Server 2003 network environment requires an administrator to be familiar with both of the different security models that can be implemented along with the roles that a server can hold. The two different security models used in Windows network environments are the workgroup model and the domain model. Please discuss in 500-600 words both options and explain why you would choose one over the other for your implementation.…

    • 825 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Nt1330 Unit 7 Lab 1

    • 753 Words
    • 4 Pages

    You are an IT manager making your first evaluations of the Windows 7 operating system. Your network consists of a large number of Windows Vista Enterprise workstations, and you want to determine whether it is feasible to upgrade them to Windows 7.…

    • 753 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    User accounts and passwords are implemented to maintain individual accountability for network resource usage. Any user who obtains an account and password for accessing a Corporation Tech provided resource, is required to keep these credentials confidential. Users of these systems may only use the accounts and passwords for which they have been assigned and authorized to use, and are prohibited from using the network to access these systems through any other means. This plan also prohibits the sharing of personal user accounts or passwords for accessing Corporation Tech or…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    ____ authentication can be used in a Windows domain environment or on a Linux system to authenticate users and computers.…

    • 817 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    The use interference of Windows 7 is called Windows aero and it’s very easy to use. It’s a WIMP (Windows, Icons, Menu, and Pointing Device) environment. It comes with some useful pre-installed application and multiple free software trials. It also comes with free antivirus software called Microsoft Essentials. Windows 7 also offers a large help and support for the users by having Windows Action Center.…

    • 537 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It 240 Week 2 Appendixb

    • 565 Words
    • 3 Pages

    1. You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Problem Set 1

    • 750 Words
    • 3 Pages

    1. The general public in the United States will be able to purchase all of the Windows 7 editions in retail stores except Basic, Enterprise, and Starter.…

    • 750 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1230 Unit 1

    • 444 Words
    • 2 Pages

    5. The only operating system edition that you can upgrade in-place to Windows 7 Professional is Windows Vista Business.…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Information security is the protection of information against accidental or malicious disclosure, modification or destruction. Information is an important, valuable asset of IDI which must be managed with care. All information has a value to IDI. However, not all of this information has an equal value or requires the same level of protection. Access controls are put in place to protect information by controlling who has the rights to use different information resources and by guarding against unauthorised use. Formal procedures must control how access to information is granted and how such access is changed. This policy also mandates a standard for the creation of strong passwords, their protection and frequency of change.…

    • 1356 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Access Control Policy

    • 833 Words
    • 3 Pages

    Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.…

    • 833 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    1. You are the network administrator for a new company that has 10 users and plans to add five more users within a year. The files need to be accessed by all 10 users and each user must have different security rights. What kind of network would you install and how would the pieces and components of this network relate to each other? Define each component.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Module 9

    • 323 Words
    • 2 Pages

    Mrs. S. is an 83 year old woman with multiple medical problems, including chronic obstructive pulmonary disease (for which she sees a pulmonologist), atrial fibrillation and systolic heart failure (for which she sees a cardiologist), hypertension, diabetes, depression, and mild dementia. She comes to your provider's office today with a new list of medications. Her pulmonologist changed her inhaler from one brand/strength to another brand/strength, but she is not sure why. Her cardiologist took her off warfarin, and again she is not sure why.…

    • 323 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    windows keys

    • 6202 Words
    • 25 Pages

    As the local PC guru you're probably very used to friends and family asking for help with their computer problems, yet having no idea how to clearly describe what's going on. It's frustrating, but Microsoft feels your pain, and Windows 7 will include an excellent new solution in the Problem Steps Recorder.…

    • 6202 Words
    • 25 Pages
    Good Essays
  • Powerful Essays

    ...jjjjjjjjjjjjjjjjjjjj

    • 2757 Words
    • 13 Pages

    This guide is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS…

    • 2757 Words
    • 13 Pages
    Powerful Essays