Topic > Workgroup Consultation for Sally Chu - 1897

Sally Chu has a business where computers are set up on a workgroup rather than an Active Directory server. Ms. Chu wants staff to have the same access privileges to the computer to run the application and use the network printer, but not to make changes to the computer. Ms. Chu also wants to know about the two authentication methods for Windows 7 and know the advantages and disadvantages of both methods. Ms. Cho has an application that will need to run in Internet Explorer (IE) protected mode on the local intranet and will need to be able to write to the computer's disk space. You will also need to create a plan to be able to apply updates to your computer in the most efficient and economical way with minimal strain on your network. When computers run slowly, you can monitor their performance to see what is causing the slowdown. Chu has six administrative staff members who need access to computers to run the application and print to network printers without having administrative rights to change settings on the computer. If staff are assigned a computer, each person can have a local account created on the computer. To add a person as a local user, click Start, right-click Computer, and then left-click Manage. The Computer Management window appears and then expands Local Users and Groups. Right-click on the User folder and click new user. Enter information such as Username, Full Name if necessary and create a temporary password. Ask the user to change the password, click Network Login, and click Create. When the staff member logs in for the first time, the staff will need to choose a new password. The local account has been created, but you need to sur...... half of the card ......saved. The administrator can subscribe to the logs on each of the computers and examine them to see what is causing the slowdown. If all your computers are slow at the same time and your application runs over a network, then the events you need to customize may be more about the computer's network traffic than the computer itself. Works CitedDunn, S. (2006). Find PC problems early with Windows Event Viewer. PC World, 24(5), 138-139. Retrieved from https://search-ebscohost-com.libdatab.strayer.edu/login.aspx?direct=true&db=a9h&AN=20347930&site=ehost-live&scope=siteJohnson, Steve. (n.d.). Advantages and Disadvantages of Biometric Fingerprint Scanners. Retrieved from http://www.ehow.com/facts_6075837_biometric-fingerprint-scanners-advantages-disadvantages.htmlZacker, C. (2011). Configuring Windows 7. (page 332). Danvers, MA: John Wiley & Sons, Inc.