Questions
Secure a Workstation Securing a workstation is one of the most important tasks you will perform...

Secure a Workstation

Securing a workstation is one of the most important tasks you will perform when setting up security for an organization or individual. A few simple tweaks to a computer’s security policy will greatly improve its resistance to attack.

Note: Some of the settings below may already be enabled by default.

On a computer running Windows 10 Pro, follow these steps to require that a user press Ctrl+Alt+Del to log on:

  1. Press Win+R, and in the Search box, type netplwiz and press Enter. Write down the usernames displayed in the User Accounts dialog box.
  2. Click the Advanced tab and under Secure sign-in, check Require users to press Ctrl+Alt+Delete. Why does this setting help increase the workstation’s security?
  3. Apply the changes and restart the computer to confirm the change.

Follow these steps to secure the computer using a screen saver and sleep mode:

  1. Open Settings, click Accounts, and click Sign-in options. Under Require sign-in, select When PC wakes up from sleep.
  2. Return to the Settings Home window, click System, and click Power & sleep. Set the screen timeouts and sleep timeouts as desired.
  3. Return to the Settings Home window, click Personalization, and click Lock screen. Scroll down and click Screen saver settings. Select a screen saver to activate the screen saver function.
  4. Set a wait time. For optimal security, this should be a low number. Check On resume, display logon screen. Click OK and close all windows.

Follow these steps to require that all users have a password:

  1. Press Win+R, and in the Search box, type gpedit.msc and then press Enter. The Local Group Policy Editor window opens.
  2. Navigate to Computer Configuration, Windows Settings, Security Settings, Account Policies, Password Policy.
  3. Change the Minimum password length policy to a value higher than zero. How many characters did you require?
  4. Search for and list three additional policies that would provide security to a workstation. Choose the policies from the nested folders from either of the parent locations below:
    1. Computer Configuration, Windows Settings, Security Settings
    2. Computer Configuration, Administrative Templates
  5. List why each of these three policies provide additional security

Please answer the questions.

In: Computer Science

The following table shows the miles per gallon of various cars and their weight in pounds....

The following table shows the miles per gallon of various cars and their weight in pounds. Suppose we are interested in predicting the miles per gallon of a car based on its weight.

Car

Weight

MPG

Buick Lucerne

3735

17

Cadillac CTS

3860

16

Chevrolet Cobalt

2721

25

Chevrolet Impala

3555

19

Chrysler Sebring Sedan

3319

21

Dodge Caliber

2966

23

Dodge Charger

3727

17

Ford Focus

2605

24

Ford Mustang

3473

19

Lincoln MKZ

3796

17

Mercury Sable

3310

18

Compute the correlation coefficient, and explain what this tells us about the relationship between weight and MPG of a car. (2pts)

Give the equation of the regression line. (2pts)

Write a sentence interpreting the y-intercept. (2pts)

Write a sentence interpreting the slope. (2pts)

A Subaru Legacy weighs 3500 pounds. Using the equation of the regression line, what would you predict the MPG of this car to be? (2pts)

The approximate fuel mileage of a Subaru Legacy is 25 MPG. Give the residual for the Subaru Legacy. (2pts)

In: Statistics and Probability

6. How did images and popular culture shape Americans' ideas about the Soviet Union and the...

6. How did images and popular culture shape Americans' ideas about the Soviet Union and the atomic bomb? Use the films embedded in the learning module. 7. What defense measures did Americans take against a possible nuclear attack in the 1940's and 1950's? 8. What was the Lavender Scare? Why were people targeted in this "scare"? 9. Why did Joseph McCarthy become so popular in America? What led to his downfall? 10. What was life like for those in America who were accused of being a communist?

In: Economics

in C a program that counts up from 0 to 20, and reset to 0 after...

in C a program that counts up from 0 to 20, and reset to 0 after 20. needs to count by a press button

In: Computer Science

The invention of the printing press made it more difficult for which type of political system...

The invention of the printing press made it more difficult for which type of political system to survive?

democracy

authoritarianism

federalism

socialism

In: Economics

1. How did Amazon adapt to change in technology as well as their customers' needs and...

1. How did Amazon adapt to change in technology as well as their customers' needs and wants since they were founded in 1995?

2. What were some of the struggles that Amazon faced when adapting to technolgy changes?

3. How did Amazon recover from the struggles they faced when adapting to change in technology?

In: Operations Management

Task 6: Using whatif and confirm Windows PowerShell allows administrators to safely test and use commands....

Task 6: Using whatif and confirm

Windows PowerShell allows administrators to safely test and use commands. In this step, you will use the whatif and confirm commands.

The [Command] -WhatIf flag shows you the results without actually performing the action.

The [Command] -Confirm flag asks you to confirm the operation before it executes.

1. Type the following command, and then press ENTER to see a list of services that would be stopped if you ran the Stop-Service command.

PS >Stop-Service M* -WhatIf

A list of services that would be stopped is displayed.

2. Type the following command, and then press ENTER to confirm whether or not to stop each service.

PS >Stop-Service M* -Confirm

For each service beginning with M, you will be asked if it should be stopped. For this lab, reply No in each case.

Task 7: Creating and manipulating variables

In this step, you will work with variables in Windows PowerShell. You will learn about their declaration, usage, and behavior.

1. To create a variable to hold a string value, type the following command, and then press ENTER.

PS >$var = "Hi there"

With this command, you created a variable named var, and you assigned the string value Hi there to it.

A variable in Windows PowerShell must begin with the dollar sign ($). If special characters are needed in a variable name, curly braces can be used to surround the variable name ({}).

2. To output the value stored in this variable, type the following command, and then press ENTER.

PS >$var

A better way to output variable values is to use a cmdlet named Write-Host before the variable name, clearly showing it will output the values to the host.

PS >Write-host $var

By default, a variable will have a null value. Null values in Windows PowerShell are represented as $null.

3. Variables in Windows PowerShell can be listed and accessed under a special location. To display the list of currently declared variables, type the following command, and then press ENTER.

PS >Get-Variable

4. By default, variables in Windows PowerShell are non-typed, which means they can hold an arbitrary value. To change the variable value and type to an integer, type the following command, pressing ENTER after each line.

PS >$var = 123

PS > $var Now the variable is holding the integer value 123.

  1. Variables can also contain lists (similar to arrays). To change the value to an array of integers, type the following commands, pressing ENTER after each line.

PS >$var = 1,2,3

PS > $var This time, the variable is holding an array of integers.

  1. To see the new type of the variable, type the following command, and then press ENTER.

PS >$var.GetType().FullName

The variable is now an array object of type System.Object[].

Arrays can be also manipulated through their .NET methods. For example, they can be queried on their length.

7. To use the Length property to retrieve the number of elements of the array, type the following command, and then press ENTER.

PS >$var.Length

The size of the array is displayed.

8. You can also access individual elements within an array by using square brackets ([]). To retrieve the second element of the array, type the following command, and then press ENTER.

PS >$var[1]

Arrays in Windows PowerShell are zero-based, which means that the first element will always be at position (index value) 0. The value of the second element of the array is displayed.

9. You can also type a variable by prefixing its declaration with the desired data type name. To re-declare the variable as an array of integers, type the following command, and then press ENTER.

PS >[int[]] $var = (1,2,3)

10. To assign the string value 0123 to the third element of the array, and then display it, type the following commands, pressing ENTER after each one.

PS >$var[2] = "0123"

PS > $var[2]

11. When an implicit conversion is not available, it displays an error. To attempt to set a string value that cannot be converted, type the following command, and then press ENTER.

PS >$var[2] = "A string value"

The error is displayed.

In: Computer Science

Johnny is a 2 day old baby boy to a first time Mom. He has been...

Johnny is a 2 day old baby boy to a first time Mom. He has been circumcised this AM. You need to do discharge teaching to Mom and Dad on circumcision care and cord care. Please put into words that you would say to the parents not the words of the book!

In: Nursing

Speculate on why polyester clothing is more wrinkle resistant than cotton. Why is a hot iron...

Speculate on why polyester clothing is more wrinkle resistant than cotton. Why is a hot iron used to press out the wrinkles?

In: Chemistry

A new industrial press will cost Pop’s Metal Fabrication Shop $120,000 and will have a useful...

A new industrial press will cost Pop’s Metal Fabrication Shop $120,000 and will have a useful lifespan of 10 years. At that point (in 10 years) the press will have a salvage value of $0. The upside of this investment is that Pop will save an estimated $2,331 per year in production costs - prior to factoring in taxes and depreciation. The company always depreciates assets in a straight-line basis and has a marginal tax rate of 25%. The firm’s cost of capital is 12%. Based on the IRR criterion, is this a smart purchase for Pop? Explain why or why not and justify your answer analytically.

In: Finance