Carbon Factors manufactures emission detectors and employs a job-order costing system. During
June, the company’s transactions and accounts included the following
Raw materials purchased $265,000
Direct materials used in production 262,000
Raw materials inventory, beginning 4,200
Corporate administrative costs 21,400
Selling expenses 18,500
Sales 334,000
Total manufacturing overhead applied 39,200
Total manufacturing overhead incurred 38,100
Finished goods, beginning 17,200
Work in process inventory, beginning 13,700
Work in process inventory, ending 15,600
Direct labor cost incurred 48,000
Finished goods, ending 16,300
How much is cost of goods manufactured for June? Show all your computations.
Solution
Direct materials used in production $ 262,000 Direct labor cost incurred $ 48,000
Total manufacturing overhead incurred $ 38,100 Add: Work in process inventory,
beginning $ 13,700 Less: Work in process inventory, ending $ 15,600 Cost ofgoods
manufactured $ 346,200.
Reply 1 neededThere are a couple of options available when upg.docxsodhi3
Reply 1 needed
There are a couple of options available when upgrading from Server 2008 (R2) to Server 2012. The first and easiest option is a clean install. In this option, data must first be backed up as this will delete the previous OS and install the new version. The second option is a standard upgrade. This option preserves all the server roles currently in place as well as the hardware being used. (Microsoft, n.d).
Some limitations to consider when upgrading are as follows:
-Windows Server 2012 only supports 64-bit hardware
-Upgrade from one language to another is not supported
-Upgrading to certain editions are dependent on the previous OS you are running.
-Some roles that are previously installed may not work properly and may need additional upgrades.
I would recommend a clean install to avoid any issues that may develop during or after an in-place upgrade. I think that it would be more difficult to troubleshoot a standard upgrade failure than a clean install. Clean install may also alleviate the issues of previous application not working properly and may solve any current issues the server maybe experiencing.
Reference:
Microsoft. (n.d). Windows Server Installation and Upgrade. Retrieved from:
https://technet.microsoft.com/en-us/windowsserver/dn527667.aspx
Reply 2 needed
Server Core is good for a very large enterprise environment. In this kind of environment, where hundreds of servers are employed, it is not ideal for the administrator to go to the individual server and manage them locally. Most of these configurations would be run through scripts and remote administrator tools, therefore, server core should be utilized.
Some roles that I would install are active directory which handles network management of users data and security. Another would be Hyper-V which consolidates multiple servers into one single system. Other roles that could be used with server core includes DNS, DHCP, File Services, Print Services, Streaming Media Services, Web Server. (Microsoft, n.d).
There are several advantages of using Server Core. One advantage would be security. Since server core has less services running on it, there are fewer possible of malicious attacks. It has greater stability since it requires less processes and services fewer things can go wrong. It also has a smaller footprint and requires fewer resources such as RAM as compared to using a full GUI. The disadvantages of Server Core is it has a steep learning curve and is limited to nine server roles
Reference:
Microsoft. (n.d). Why is Server Core Useful? Retrieved from: https://msdn.microsoft.com/en-us/library/dd184076.aspx
Reply 1 needed
When migrating from Windows Server 2008 to Windows Server 2012, the system requirements remain unchanged. Some features such as virtual domain controller cloning require that the PDC emulator run Windows Server 2012 and a computer running Windows Server 2012 with the Hyper-V role installed. Here are some big issues to keep in mind ...
Reply 1 neededThere are a couple of options available when upg.docxsodhi3
Reply 1 needed
There are a couple of options available when upgrading from Server 2008 (R2) to Server 2012. The first and easiest option is a clean install. In this option, data must first be backed up as this will delete the previous OS and install the new version. The second option is a standard upgrade. This option preserves all the server roles currently in place as well as the hardware being used. (Microsoft, n.d).
Some limitations to consider when upgrading are as follows:
-Windows Server 2012 only supports 64-bit hardware
-Upgrade from one language to another is not supported
-Upgrading to certain editions are dependent on the previous OS you are running.
-Some roles that are previously installed may not work properly and may need additional upgrades.
I would recommend a clean install to avoid any issues that may develop during or after an in-place upgrade. I think that it would be more difficult to troubleshoot a standard upgrade failure than a clean install. Clean install may also alleviate the issues of previous application not working properly and may solve any current issues the server maybe experiencing.
Reference:
Microsoft. (n.d). Windows Server Installation and Upgrade. Retrieved from:
https://technet.microsoft.com/en-us/windowsserver/dn527667.aspx
Reply 2 needed
Server Core is good for a very large enterprise environment. In this kind of environment, where hundreds of servers are employed, it is not ideal for the administrator to go to the individual server and manage them locally. Most of these configurations would be run through scripts and remote administrator tools, therefore, server core should be utilized.
Some roles that I would install are active directory which handles network management of users data and security. Another would be Hyper-V which consolidates multiple servers into one single system. Other roles that could be used with server core includes DNS, DHCP, File Services, Print Services, Streaming Media Services, Web Server. (Microsoft, n.d).
There are several advantages of using Server Core. One advantage would be security. Since server core has less services running on it, there are fewer possible of malicious attacks. It has greater stability since it requires less processes and services fewer things can go wrong. It also has a smaller footprint and requires fewer resources such as RAM as compared to using a full GUI. The disadvantages of Server Core is it has a steep learning curve and is limited to nine server roles
Reference:
Microsoft. (n.d). Why is Server Core Useful? Retrieved from: https://msdn.microsoft.com/en-us/library/dd184076.aspx
Reply 1 needed
When migrating from Windows Server 2008 to Windows Server 2012, the system requirements remain unchanged. Some features such as virtual domain controller cloning require that the PDC emulator run Windows Server 2012 and a computer running Windows Server 2012 with the Hyper-V role installed. Here are some big issues to keep in mind ...
1Running head WINDOWS SERVER DEPLOYMENT PROPOSAL2WINDOWS SE.docxaulasnilda
1
Running head: WINDOWS SERVER DEPLOYMENT PROPOSAL
2
WINDOWS SERVER DEPLOYMENT PROPOSAL
Windows server deployment proposal
My Name
University of Maryland University College
WINDOWS SERVER / CMIT 369
December 8, 2019
Windows server deployment proposal
This proposal is a description of the implementation and configuration of the core IT services as a solution to "We Make Windows" Inc. This solution will supply the needs of the company for 2-3 years. As part of this proposal, six topics will be addressed in detail and both the business and technical reasoning for the choice of each of these topic will be provided. The 6 topics that will be addressed in this proposal include the new features of windows server 2016 that that the company can take advantage of, deployment and server editions, active directory domains, DNS and DHCP designs, deployment of application services, and last but not the least, printer and file sharing. That said, this proposal progresses as follows.
New features of windows server 2016 that WMW can take advantage
Nano server
One of the new features of windows server 2016 that WMW Inc can take advantage of is the nano server feature. At this point in time, it should be understood that the a "nano server is the server that is responsible for refactoring the core pieces of the windows server, turning them into their minimally functional state" (Ferrill, 2015). To expound further on the refactoring aspect, it should be know that refactoring is that process of analyzing a given code, in this case, the core pieces of the windows serve, the goal of which is to simplify it. Having described a nano server, it is time to address both the technical and business reasoning for this feature.
One of the technical reasoning for this new feature is that a nano server can run on a bare-metal operating system. In basic terms, a bare metal operating system is basically a hard disk which is the usual medium on which many computer operating systems are installed. So, the capacity of the nano server running on a bare metal operating system is advantageous in that the system will require fewer updates. At the same time, this means that fewer rebooting of the system when the updates are done will be necessary. From the business standpoint, fewer updates and reboots will ensure the business operations remain online and functional most of the time with little interruptions. In other words, there will be little down times. Since down times are costly to the business, this means that the element of cost due to down times will be addressed by the nano server.
Another technical reasoning for this feature is that nano servers are so small that they could be ported across physical sites, data centers as well as other servers. In fact, compared to other installation options, this feature posses a 92% smaller installation. This means that the installation can connected easily across physical sites, data centers, and even across other server ...
Virtual machine conditions with activation key microsoft office 2019 have become universal in the datacenter, and being able to convey virtual server jobs and jobs while sending working frameworks is a significant piece of the organization cycle.
Upgrade to Windows Server 2022 Remote Desktop Services for better up-to-date features. Windows Server 2022's Remote Desktop Services (RDS) capability enables numerous users to connect at once and remotely view a desktop and apps. Shop Now at https://www.directdeals.com/
Synergy 2015 Session Slides: SYN235 Cost-effective XenDesktop and XenApp Desi...Citrix
Get this slide deck from the SYN235 session at Citrix Synergy 2015 to learn about how you can effectively design cost-effective deployments for the SMB.
Windows Server Deployment Proposal For Worldwide Advertising, In.docxambersalomon88660
Windows Server Deployment Proposal For
Worldwide Advertising, Inc.
Proposed By: Jermaine Nicholson
10/20/15
This Windows Server Deployment Proposal will include potential network infrastructure solutions that will accommodate all factors needed for the establishment of Worldwide Advertising, Inc to have a strong infrastructure. This proposal will provide the details that will go into account for the implementation and configuration of the Windows 2012 Servers along with the roles and features that these server will provide so that the network infrastructure meets the needs for WAI now and take in consideration for company growth for the next 2-3 years. The proposal will also include the technical reasons for the choices we’re presenting, as well as the business reasons so you can take into account the cost of implementing these proposed solutions.
We took into account that WAI will begin with roughly 90 employees and we assume that the company will continue to roughly 150-200 employees over the next 2-3 years. So this proposal will be tailored towards this assumption. We are also taking into account the two locations, Los Angeles (being the Headquarters) and New York (being the branch office). We are proposing that we introduce 4 servers, with all four hosting the Windows Server 2012 R2 Datacenter edition, to be deployed across these two locations. Two servers will be located at the Headquarters in Los Angeles and the other two will be deployed in the New York office.
The two servers at the Los Angeles location will be the main servers used for the core I.T network services, such as DHCP, DNS, Active Directory, and File Server (these services will all be explained later in this proposal). One of the two servers at both locations will solely be used as a backup server for fault tolerance, in case the main server goes down for whatever reason. The backup server will be configured the same way as the primary server would with all of the roles and features as the primary, but will only be used in the event of an outage to the primary server.
The deployment method of these servers would be to manually build the primary server from scratch at the Headquarters, then we will used a script from the primary to automate the deployment process of the backup server. This way we know for sure that the both servers at the Headquarters will both be configured in a uniform manner. We will also manually deploy the primary branch server since they will host different roles and features than the HQ servers, then use a script to deploy the backup. The branch servers will be configured with Server core as a security measure, it minimizes the risk of potential hackers trying to find loopholes in the branch sites networks.
Windows Server 2012 Features
When it comes to implementing a network infrastructure from the ground-up, it takes patience and thorough configuration to make sure that no steps are missed, if not would result with major network pr.
Windows Server Infrastructure Upgrade and Redesign at Fringe Dynam.docxadolphoyonker
Windows Server Infrastructure Upgrade and Redesign at Fringe Dynamic.
Overview
Fringe Dynamic is an educational software developer that provides software and cloud computing solutions to private and public educational institutions throughout North America and Europe. The organization currently has four major offices located in
Jacksonville, Florida,
Wood, South Dakota
and London, England.
A sales team of more than a hundred work across the United States and Europe, primarily from their own homes. Fringe Dynamic has experienced a combination of growth and disaster in the last 3 years and plans to add an additional 130+ employees, including opening a new office in Sandy, Utah in the next 6 months. To meet these growth challenges, Fringe Dynamic is in the process of upgrading the network environment from the current ad hoc design, comprised of Windows 2003, 2008 and *NIX systems, to Windows 2012 R2 Active Directory. Steps have already been taken to improve the network infrastructure. The Jacksonville, Florida location has replaced all 2008 Domain Controllers with Windows 2012 Servers. However, the Wood, South Dakota and London, England locations are still running a single Windows 2008 Domain Controller at each site. Currently all server and workstation IP addresses are statically assigned. DNS is hosted on an older generation UNIX server that has been hacked several times due to faulty security. Remote users currently connect via VPN, which has caused numerous security incidents due to missing antivirus software, outdated AV signatures and missing OS patches on workstations and laptops.
Although the Sandy, Utah location has not officially opened there are ten users currently deployed to that location. There are currently no domain controllers or qualified personal to support them at this location. This site needs to be incorporated into the Fringe Dynamic Active Directory ASAP. Sandy, Utah users must be able to authenticate and access Fringe Dynamic Active Directory services. Fringe Dynamic has recently acquired another company Global Dynamics. The existing Global Dynamics Active Directory Domain needs to be integrated into the existing Fringe Dynamic Active Directory forest. The Fringe Dynamic data center is located at the Jacksonville, Florida and London, England locations. This is where Fringe Dynamic hosts and maintains its cloud computing services. Due to increased demand for its cloud services Fringe Dynamic has experienced difficulty getting servers and services deployed in time due to the lack of an efficient and cost-effective deployment process. The current Active Directory is a single domain. It is up to you finish the network design and improve the server infrastructure.
Current Physical Locations
Current Logical Design
Required Proposal Responses
Executive Overview – Provide an executive overview for Infrastructure proposal. How will your proposal help Fringe Dynamic? What are the key aspects of your design? Why sho.
Presentation from webinar on SAP Business One Cloud in SAP India Partner Highlight Series. Describes SAP Business One Cloud installation and landscape and differences with On-Premises / Hosted Installation. Also shares our experience in building B1CLOUD and its details.
The Windows server operating systems are a series of enterprise-class server operating systems from Microsoft. They are designed for multi-user service sharing and comprehensive administrative control of data storage, applications, and corporate networks.
Castiglianos MethodSolutionI cant upload the image due to.pdfAmansupan
Carroll Company sells all its output at 25 percent above cost. Pacific Corporation purchases all
its inventory from Carroll. Selected information on the operations of the companies over the past
three years is as follows:
Pacific acquired 60 percent of the ownership of Carroll on January 1, 20X1, at underlying book
value.
Compute consolidated net income and income assigned to the controlling interest for 20X2,
20X3, and 20X4.
Carroll Company sells all its output at 25 percent above cost. Pacific Corporation purchases all
its inventory from Carroll. Selected information on the operations of the companies over the
past three years is as follows:
Solution
Cosolidated Income 20x2 20x3 20x4 Operating Income(Pacific) 160000 249000 315000
Operating Income(Carroll) 109000 99000 169000 Total 269000 348000 484000 Unrealised
profit on ending/op. Inv. 70700-(70700/125*100) -14140 14140 106200-
(106200/125*100) -21240 21240 139200-(139200/125*100) -27840 Cosolidated net
Income 254860 340900 477400 Cosolidated net Income 254860 340900 477400
Less: Income assigned to non-cont.int. (109000-14140)*40% 37944 (99000+14140-
21240)*40% 36760 (169000+21240-27840)*40% 64960 Income assigned to
Cont.int. 216916 304140 412440.
Cars coming along Magnolia Street come to a fork in the road and hav.pdfAmansupan
Capital markets consist of securities having maturities greater than one year. true or false
Solution
True.
In capital markets, long term securities are traded. In finance, long term refers to a period greater
than 1 year. Therefore, capital markets consists of securities having maturities greater than one
year. These securities include. Preferred stocks, common stocks, long term bonds etc..
More Related Content
Similar to Case Project 12-2 Devising an AD DS Design with RODC, AD RMS, and A.pdf
1Running head WINDOWS SERVER DEPLOYMENT PROPOSAL2WINDOWS SE.docxaulasnilda
1
Running head: WINDOWS SERVER DEPLOYMENT PROPOSAL
2
WINDOWS SERVER DEPLOYMENT PROPOSAL
Windows server deployment proposal
My Name
University of Maryland University College
WINDOWS SERVER / CMIT 369
December 8, 2019
Windows server deployment proposal
This proposal is a description of the implementation and configuration of the core IT services as a solution to "We Make Windows" Inc. This solution will supply the needs of the company for 2-3 years. As part of this proposal, six topics will be addressed in detail and both the business and technical reasoning for the choice of each of these topic will be provided. The 6 topics that will be addressed in this proposal include the new features of windows server 2016 that that the company can take advantage of, deployment and server editions, active directory domains, DNS and DHCP designs, deployment of application services, and last but not the least, printer and file sharing. That said, this proposal progresses as follows.
New features of windows server 2016 that WMW can take advantage
Nano server
One of the new features of windows server 2016 that WMW Inc can take advantage of is the nano server feature. At this point in time, it should be understood that the a "nano server is the server that is responsible for refactoring the core pieces of the windows server, turning them into their minimally functional state" (Ferrill, 2015). To expound further on the refactoring aspect, it should be know that refactoring is that process of analyzing a given code, in this case, the core pieces of the windows serve, the goal of which is to simplify it. Having described a nano server, it is time to address both the technical and business reasoning for this feature.
One of the technical reasoning for this new feature is that a nano server can run on a bare-metal operating system. In basic terms, a bare metal operating system is basically a hard disk which is the usual medium on which many computer operating systems are installed. So, the capacity of the nano server running on a bare metal operating system is advantageous in that the system will require fewer updates. At the same time, this means that fewer rebooting of the system when the updates are done will be necessary. From the business standpoint, fewer updates and reboots will ensure the business operations remain online and functional most of the time with little interruptions. In other words, there will be little down times. Since down times are costly to the business, this means that the element of cost due to down times will be addressed by the nano server.
Another technical reasoning for this feature is that nano servers are so small that they could be ported across physical sites, data centers as well as other servers. In fact, compared to other installation options, this feature posses a 92% smaller installation. This means that the installation can connected easily across physical sites, data centers, and even across other server ...
Virtual machine conditions with activation key microsoft office 2019 have become universal in the datacenter, and being able to convey virtual server jobs and jobs while sending working frameworks is a significant piece of the organization cycle.
Upgrade to Windows Server 2022 Remote Desktop Services for better up-to-date features. Windows Server 2022's Remote Desktop Services (RDS) capability enables numerous users to connect at once and remotely view a desktop and apps. Shop Now at https://www.directdeals.com/
Synergy 2015 Session Slides: SYN235 Cost-effective XenDesktop and XenApp Desi...Citrix
Get this slide deck from the SYN235 session at Citrix Synergy 2015 to learn about how you can effectively design cost-effective deployments for the SMB.
Windows Server Deployment Proposal For Worldwide Advertising, In.docxambersalomon88660
Windows Server Deployment Proposal For
Worldwide Advertising, Inc.
Proposed By: Jermaine Nicholson
10/20/15
This Windows Server Deployment Proposal will include potential network infrastructure solutions that will accommodate all factors needed for the establishment of Worldwide Advertising, Inc to have a strong infrastructure. This proposal will provide the details that will go into account for the implementation and configuration of the Windows 2012 Servers along with the roles and features that these server will provide so that the network infrastructure meets the needs for WAI now and take in consideration for company growth for the next 2-3 years. The proposal will also include the technical reasons for the choices we’re presenting, as well as the business reasons so you can take into account the cost of implementing these proposed solutions.
We took into account that WAI will begin with roughly 90 employees and we assume that the company will continue to roughly 150-200 employees over the next 2-3 years. So this proposal will be tailored towards this assumption. We are also taking into account the two locations, Los Angeles (being the Headquarters) and New York (being the branch office). We are proposing that we introduce 4 servers, with all four hosting the Windows Server 2012 R2 Datacenter edition, to be deployed across these two locations. Two servers will be located at the Headquarters in Los Angeles and the other two will be deployed in the New York office.
The two servers at the Los Angeles location will be the main servers used for the core I.T network services, such as DHCP, DNS, Active Directory, and File Server (these services will all be explained later in this proposal). One of the two servers at both locations will solely be used as a backup server for fault tolerance, in case the main server goes down for whatever reason. The backup server will be configured the same way as the primary server would with all of the roles and features as the primary, but will only be used in the event of an outage to the primary server.
The deployment method of these servers would be to manually build the primary server from scratch at the Headquarters, then we will used a script from the primary to automate the deployment process of the backup server. This way we know for sure that the both servers at the Headquarters will both be configured in a uniform manner. We will also manually deploy the primary branch server since they will host different roles and features than the HQ servers, then use a script to deploy the backup. The branch servers will be configured with Server core as a security measure, it minimizes the risk of potential hackers trying to find loopholes in the branch sites networks.
Windows Server 2012 Features
When it comes to implementing a network infrastructure from the ground-up, it takes patience and thorough configuration to make sure that no steps are missed, if not would result with major network pr.
Windows Server Infrastructure Upgrade and Redesign at Fringe Dynam.docxadolphoyonker
Windows Server Infrastructure Upgrade and Redesign at Fringe Dynamic.
Overview
Fringe Dynamic is an educational software developer that provides software and cloud computing solutions to private and public educational institutions throughout North America and Europe. The organization currently has four major offices located in
Jacksonville, Florida,
Wood, South Dakota
and London, England.
A sales team of more than a hundred work across the United States and Europe, primarily from their own homes. Fringe Dynamic has experienced a combination of growth and disaster in the last 3 years and plans to add an additional 130+ employees, including opening a new office in Sandy, Utah in the next 6 months. To meet these growth challenges, Fringe Dynamic is in the process of upgrading the network environment from the current ad hoc design, comprised of Windows 2003, 2008 and *NIX systems, to Windows 2012 R2 Active Directory. Steps have already been taken to improve the network infrastructure. The Jacksonville, Florida location has replaced all 2008 Domain Controllers with Windows 2012 Servers. However, the Wood, South Dakota and London, England locations are still running a single Windows 2008 Domain Controller at each site. Currently all server and workstation IP addresses are statically assigned. DNS is hosted on an older generation UNIX server that has been hacked several times due to faulty security. Remote users currently connect via VPN, which has caused numerous security incidents due to missing antivirus software, outdated AV signatures and missing OS patches on workstations and laptops.
Although the Sandy, Utah location has not officially opened there are ten users currently deployed to that location. There are currently no domain controllers or qualified personal to support them at this location. This site needs to be incorporated into the Fringe Dynamic Active Directory ASAP. Sandy, Utah users must be able to authenticate and access Fringe Dynamic Active Directory services. Fringe Dynamic has recently acquired another company Global Dynamics. The existing Global Dynamics Active Directory Domain needs to be integrated into the existing Fringe Dynamic Active Directory forest. The Fringe Dynamic data center is located at the Jacksonville, Florida and London, England locations. This is where Fringe Dynamic hosts and maintains its cloud computing services. Due to increased demand for its cloud services Fringe Dynamic has experienced difficulty getting servers and services deployed in time due to the lack of an efficient and cost-effective deployment process. The current Active Directory is a single domain. It is up to you finish the network design and improve the server infrastructure.
Current Physical Locations
Current Logical Design
Required Proposal Responses
Executive Overview – Provide an executive overview for Infrastructure proposal. How will your proposal help Fringe Dynamic? What are the key aspects of your design? Why sho.
Presentation from webinar on SAP Business One Cloud in SAP India Partner Highlight Series. Describes SAP Business One Cloud installation and landscape and differences with On-Premises / Hosted Installation. Also shares our experience in building B1CLOUD and its details.
The Windows server operating systems are a series of enterprise-class server operating systems from Microsoft. They are designed for multi-user service sharing and comprehensive administrative control of data storage, applications, and corporate networks.
Castiglianos MethodSolutionI cant upload the image due to.pdfAmansupan
Carroll Company sells all its output at 25 percent above cost. Pacific Corporation purchases all
its inventory from Carroll. Selected information on the operations of the companies over the past
three years is as follows:
Pacific acquired 60 percent of the ownership of Carroll on January 1, 20X1, at underlying book
value.
Compute consolidated net income and income assigned to the controlling interest for 20X2,
20X3, and 20X4.
Carroll Company sells all its output at 25 percent above cost. Pacific Corporation purchases all
its inventory from Carroll. Selected information on the operations of the companies over the
past three years is as follows:
Solution
Cosolidated Income 20x2 20x3 20x4 Operating Income(Pacific) 160000 249000 315000
Operating Income(Carroll) 109000 99000 169000 Total 269000 348000 484000 Unrealised
profit on ending/op. Inv. 70700-(70700/125*100) -14140 14140 106200-
(106200/125*100) -21240 21240 139200-(139200/125*100) -27840 Cosolidated net
Income 254860 340900 477400 Cosolidated net Income 254860 340900 477400
Less: Income assigned to non-cont.int. (109000-14140)*40% 37944 (99000+14140-
21240)*40% 36760 (169000+21240-27840)*40% 64960 Income assigned to
Cont.int. 216916 304140 412440.
Cars coming along Magnolia Street come to a fork in the road and hav.pdfAmansupan
Capital markets consist of securities having maturities greater than one year. true or false
Solution
True.
In capital markets, long term securities are traded. In finance, long term refers to a period greater
than 1 year. Therefore, capital markets consists of securities having maturities greater than one
year. These securities include. Preferred stocks, common stocks, long term bonds etc..
Case Study 4.2Investing in Cardiology Services “It’s time for us t.pdfAmansupan
Cardinality Proof Problems Cardinality Proof Problems (1) Suppose f: S right arrow T, and that f
is one to one. Prove that S ~ f(S). (2) Show that R~(a,b) for every a
Solution
f is a function from S to T
f is given to be one to one
i.e. each element in f has a unique image in T and also if
f(a) = f(b) then a = b
Hence if n is the no of elements in S,
f(S) will have image for each of the n element. Hence
n[f(S)] = n(S)
S~f(S)
-------------------------------------------------------------------------------------------------------
2)
b) Consider the function f(x) = sinx, where 0<=x<=pi/2
sin 0 =0 and sin pi/2 =1
Also sinx is one to one
Hence (0,pi/2)~(0,1)
c) Consider the interval (-pi/2, pi/2) as domain for the function
f(x) = tan x
As from -pi/2 to 0 tan is negative, we see that f is one to one.
Hence f(x) = (-tan pi/2, tanpi/2)
= (-infinity, infinity)
Or (-pi/2, pi/2)~R.
Cars arrive at a toll booth at a mean rate of 7 cars every 10 minute.pdfAmansupan
Capital Experts limited (CEL) specializes in taking underperforming companies to a higher level
of performance.CEL\'s capital structure at December 31,2013, included 28,000 shares of $2.25
preferred stock and 225,000 shares of common stock.During 2014,CEL issued common stock
and ended that year with 243,000 shares of common stockoutstanding.Average common shares
outatanding during 2014 were 235,000.Income from continiing operations during 2014 was
$485,000.The company discontinued a segment of the business at a loss of $89,000, and an
exraordinary gain of $94,000.All amounts after income tax.Assume the number of preferred
stock did not change during 2014.
1.Compute CEL\'s earnig per share .Start with the income from continuing operations
2.Analyst believe CEL can earn its current level of income for the indefinite future..Estimate the
market price of a share of CEL common stock at the investment capitalization rate of 9%,11%
and 13%.What estimte presumes an investment in CEL is the most risky.How can you tell
Solution
Since, the rate of Preferred Stock is not given. Hence,we are directly taking the Income from
Conntinuing Operations for Calculation of EPS.
CEL Earning Per Share = 485,000 / 235000
= 2.06.
Case Study 2 Phillip Morris V. the market. Table 10.10 (See Below) .pdfAmansupan
Card Selection: Thee cards from a standad deck of 52 playing cards ae successively drawn at
random withour eplacement. Find the pobability that (a) all three cads ae kings and (b)all three
cards are hearts.
Please explain****
Solution
a)
(4/52)*(3/51)*(2/50) = 1/5525 0.00018
b)
(13/52)*(12/51)*(11/50) = 11/850 0.0129.
Case can be found at following linkColonial Broadcasting Company - .pdfAmansupan
Car Fuel Consumption Ratings Listed below are combined city-highway fuel consumption
ratings (in miles/gal) for different cars measured under the old rating system and a new rating
system introduced in 2008 (based on data from USA Today). The new rating were implemented
in response to complaints that the old ratings were too high. Use a 0.01 significance level to test
the claim the old ratings are higher than the new ratings.
Old rating 16 18 27 17 33 28 33 18 24 19 18 27 22 18 20 29 19 27 20 21
New rating 15 16 24 15 29 25 29 16 22 17 16 24 20 16 18 26 17 25 18 19
Solution
Old rating: n1=20, xbar1=22.7, s1=5.37
New rating: n2=20, xbar2=20.35, s2= 4.72
The test hypothesis is
Ho:1=2
Ha:1>2
The test statistic is
t=(xbar1-xbar2)/[s1^2/n1 + s2^2/n2]
=(22.7-20.35)/sqrt(5.37^2/20 + 4.72^2/20)
= 1.47
Given a=0.01, the critical value is |t(0.01, df=n1+n2-2=38)|=2.43 (check student t table)
Since t=1.47 is less than 2.43, we do not reject Ho..
Can u use the definition of convergence to prove that (5n+17)(2n) c.pdfAmansupan
Can u use the definition of convergence to prove that (5n+17)/(2n) converges..
Solution
(5n+17)/(2n) I\'m going to claim that the sequence converges to 5/2. Suppose we
have e > 0. We need an N such that: n > N ===> |(5n + 17) / (2n) - 5/2| < e Let\'s work
backwards from |(5n + 17) / (2n) - 5/2| < e, so that each step implies the previous step: |(5n + 17)
/ (2n) - 5/2| < e |(5n + 17) / n - 5| < 2e |(5n + 17) / n - 5n / n| < 2e |17 / n| < 2e 17 / n < 2e ... (since
n > 0) n > 17 / (2e) so it converges over n > 17 / (2e).
can u make more sentence I do not want to read. I need expain abou.pdfAmansupan
can u make more sentence?? I do not want to read. I need expain about these.....
Solution
Bed bugs, have resurged to quickly become a very important pest of the 21st century, as they
invade numerous urban areas. Our society has had a 30+ year \"vacation\" from this pest, when
bed bugs were almost completely removed from North America as a result of mass treatments
with older types of insecticides (DDT, Chlordane, Lindane)
Bed bugs are parasites that feed on the blood of people, using these blood meals to grow and
reproduce. They do not distinguish between dirty or clean homes and all people are vulnerable to
infestations in their homes. Bed bugs are also capable of feeding on animals, including dogs,
cats, and other pets.
Bed bugs typically cluster together in favorable harborage areas. However, some bed bugs will
live by themselves, away from the rest of an infestation. The best way to determine if you have
an infestation is to look for bed bugs where you sleep (or rest). In bedrooms, look particularly on
and around boxsprings, mattresses, bed frames, tufts, folds, and buttons on mattresses, furniture,
such as desks and chairs, behind wall paper, clocks and pictures, cracks in wood floors, and
under the edge of carpet. If you travel also check your luggage, where you typically set it down
when you enter your home and where you store it.
While bed bugs are most commonly found in bedrooms, infestations can also occur in other
rooms, including: bathrooms; living rooms; and laundry rooms. Dark blood spots on sheets and
bedding may indicate bed bug feeding. Bed bugs will sometimes excrete while they are feeding.
This results in darker (dark reddish or brownish) spots or smears found on bed sheets,
pillowcases and mattresses, or in nearby areas. This material is composed mostly of digested
blood and the stains are very characteristic. In severe infestations, bed bugs may be more
noticeable. The accumulation of bugs, cast skins and fecal spots will be very apparent upon close
inspection.
Remember these insects are small and very flat, so they can move into very tight corners and
cracks. In some infestations, they were found under picture frames, in between the glass and the
frame and behind electrical outlet and other wall plates! Be prepared to do some close inspection
and when in doubt, you should consider having the inspection done by a pest control service
provider.
You can use your washing machine and dryer to kill bed bugs that may be infesting clothes.
Clothes laundered in hot water and/or dried in temperatures hotter than 122.
can u help me or should u kall miSolution .pdfAmansupan
can u help me or should u kall mi??
Solution
Mean: total of the added numbers divided by how many numbers there were
Median: list them from smallest to greatest --> find the middle number (if there are an even
amount of numbers, then add the 2 and divide by 2) Mode: the number listed the most Range: the
difference between the highest and lowest number.
Can the Fed Prevent U.S. RecessionsSolutionThe Federal Reserv.pdfAmansupan
Can the Fed Prevent U.S. Recessions?
Solution
The Federal Reserve makes decisions based on great academic economists and veteran bank and
corporate executives. Politics is minimal, at least compared to most other government decisions.
Tremendous resources support the decisions, with great economists on staff, massive data banks
and access to outside experts. You would think that the Fed can prevent recessions. You would
be wrong.
The Fed just released minutes from the policy meetings held in 2008, as they do regularly with a
five-year time lag. The minutes depict a massive failure of the technocratic ideal of putting some
smart people in the room and letting them run things.
Chairman Ben Bernanke is quoted as saying that he is “confounded and muddled.” The Fed
eased early in 2008 and patted themselves on their backs. In March, after the Bear Stearns
rescue, Janet Yellen said that “the likelihood of a severe financial panic has diminished.” That
could actually be accurate, if she meant that the likelihood was going from 99 percent to 98
percent.
Tim Geithner, then president of the New York Fed, said in March 2008, “It is very hard to make
the judgment now that the financial system as a whole or the banking system as a whole is
undercapitalized. Some people are out there saying that . . . . Based on everything we know
today, if you look at very pessimistic estimates of the scale of losses across the financial system,
on average relative to capital, they do not justify that concern.” He further suggested that talk
about the risks within the financial system was harmful, clearly favoring a “trust us” message to
the public. This discussion happened well before Lehman declared bankruptcy and credit
markets melted down.
However, the people making decisions at the Fed (the Board of Governors plus the 12 regional
bank presidents, four of whom vote at any one time) are neither stupid nor ignorant. They are all
talented, and they know the issues.
(On a personal note, my lasting memory of the Fed Board is that I was congratulating myself for
having been invited to meet with them, and then Alan Greenspan asked the toughest question I
had fielded since my doctoral dissertation. It was also the most critical question for the economy
at the time. And I had to confess that I didn’t know the answer.).
Can SS ever have a value less than zeroSolutionNo, they can n.pdfAmansupan
Can SS ever have a value less than zero?
Solution
No, they can never have a value less than 0 for all S = R, where R={1,2,3,4,.......} U {-1,-2,-3,-
4,......}
so, SS is always negative for any real number. Positive and negative doesnt matter. As long as S
is not an imaginary number like (-3). In which case the answer would be -3.....
Can someone show me how to prove this I can easily use a DFA bu.pdfAmansupan
Can someone show me how to prove this? I can easily use a DFA but i need it more general.
Prove that if a language L contains finitely many elements then it is regular. Can someone show
me how to prove this? I can easily use a DFA but i need it more general.
Solution
Buy the basic definition of regularity of a Language we mean that there is some mechanish buy
which we can distinguish the member of a language from the non member in deterministic way.
To handle a language containing infinite number of elements we use DFA\'s etc.. But if we know
that the elements are finite we can easily check the membership of a language buy just checking
will all the members of the language. In this way member ship is guarenteed to be find if the
elements are finite.
So if a language contains a finite amount of elements then it is Regular..
Can someone please help me with this question. Suppose that Xn, n = .pdfAmansupan
Can someone please help me with this question. Suppose that Xn, n = 1,2,3,... is a Bernoulli
process with parameter p, i.e. P(Xn = 1) = p for all n. Suppose that Wn, n = 1,2,3,... is another
Bernoulli process with parameter s. We assume that the two random processes are completely
independent of each other (that is, any collection of samples of Xn is independent from any
collection of Wn ). We form a new random process Yn, n = 1.2,3,... by defining Yn = Xn Wn,
where the operation denotes mod 2 addition. This setup can be thought of as taking an input
digital signal Xn and sending it across a binary channel to a receiver. The binary channel can
cause an error between the input Xn and output Yn with probability s. Such a communication
channel is called an additive noise channel because the output Is the input plus an independent
noise process (where plus here means mod 2). We know that Yn is a Bernoulli process. Find its
parameter, i.e. compute P(Yn = 1) If the signal 0 was sent, what is the probability that a 0 is
received? a 1 is received? Find the conditional pmf Find an expression for the probability of
error, i.e. P(Yn Xn).
Solution
(a)P(Y_n=1)= P(X_n=1,W_n=0)+P(X_n=0,W_n=1) = p(1-s)+s(1-p) = p+s-2ps
(b)if signal 0 was sent,then the probability that 0 is received=p(X_n=0,W_n=0)
= (1-p) (1-s)
prob that a 1 is received=P(X_n=1,W_n=1) = ps
(d)P(Y_n neq X_n) = P(X_n=1,W_n=1)+P(X_n=0,W_n=1) = ps+(1-p)s = s.
Can someone please guide me through this homework problem I will ra.pdfAmansupan
Can someone please guide me through this homework problem? I will rate immediately. The
campus recruiter for an international conglomerate classifies the large number of students she
interviews into three categories - the lower quarter, the middle half, and the upper quarter. If she
meets six students on a given morning, what is the probability that they will be evenly divided
among the three categories? What is the marginal probability that exactly two will belong to the
middle half?
Solution
probability that they will be evenly divided among the three categories =
(2/6)*(2/6)*(2/6) = 1/27 the marginal probability that exactly two will belong to the middle half
= 2/6 = 1/3.
Can someone explain to me where the 850 came fromThe U.S. investm.pdfAmansupan
Can someone explain to me where the 850 came from?
The U.S. investment is denominated in dollars; pays 3 percent (i)
The German investment in euros; pays 2 percent (i*)
In one year, $1,000 invested in US will pay $1,000 x (1+0.03), or $1,030
The return on German CD depends on the fixed interest rate and exchange rate a year from now
Solution
850 is equal to 1030/1.2
When US$ is converted to Euros..
Can someone help me with this code When I run it, it stops after th.pdfAmansupan
Can someone help me with this code? When I run it, it stops after the output
Enter Student 1 Details
Name
I would just like to know what is incorrect with my code & how I can fix it.
Here is my code:
package studentclient;
import java.util.Scanner;
public class StudentClient {
public static void main(String[] args) {
Student s1;
Student s2;
s1 = new Student(\"Lisa\", \"111-11-111\", 3.0);
s2 = new Student(\"Jacob\", \"777-77-777\", 4.0);
System.out.println(\"Enter Student 1 Details\");
System.out.println(\"Name\");
Scanner sc=new Scanner(System.in);
String Name = sc.next();
System.out.println(\"Social Security number\");
String Ssn = sc.next();
System.out.println(\"GPA\");
double gpa = sc.nextDouble();
System.out.println(\"Enter Student 2 Details\");
System.out.println(\"Name\");
Name=sc.next();
System.out.println(\"social security number\");
Ssn=sc.next();
System.out.println(\"GPA\");
gpa=sc.nextDouble();
System.out.println(\"Student 1 deatils\");
System.out.println(\"name\"+s1.getName());
System.out.println(\"Social Secuirty Number:\"+s1.getSsn());
System.out.println(\"GPA:\"+s1.getGpa());
System.out.println(\"Student 2 details\");
System.out.println(\"name\"+s2.getName());
System.out.println(\"Social Security Number:\"+s2.getSsn());
System.out.println(\"GPA:\"+s2.getGpa());
if(s1 ==(s2))
System.out.println(\"Student details are equal\");
else
System.out.println(\"Student details are not equal\");
s2 = new Student(\"Jacob\", \"000-00-000\", 4.0);
System.out.println(\"Enter new details for Student 2\");
System.out.println(\"Name:\");
Name=sc.next();
s2.setName();
System.out.println(\"Social Security number\");
Ssn=sc.next();
s2.setSsn(Ssn);
System.out.println(\"GPA\");
gpa=sc.nextDouble();
s2.setGpa(gpa);
if(s1 ==(s2))
System.out.println(\"Student details are equal\");
else
System.out.println(\"Student details are not equal\");
}
}
package studentclient;
class Student {
String name;
String social_security_number;
double GPA;
public Student( String newName, String newSsn, double newGpa )
{
this.name=newName;
this.social_security_number=newSsn;
this.GPA=newGpa;
}
public String getName( )
{
return this.name;
}
public void setName( String newName )
{
this.name=newName;
}
public String getSsn( )
{
return this.social_security_number;
}
public void setSsn( String newSsn )
{
// Your code here
this.social_security_number=newSsn;
}
public double getGpa( )
{
return this.GPA;
}
public void setGpa( double newGpa )
{
if(newGpa<0 || newGpa>4)
System.out.println(\"Error! Gpa value should be in the range(0 to 4 ) only.\");
else
this.GPA=newGpa;
}
@Override
public String toString( )
{
return (\"name:\"+this.name+\" Social Security number:\"+this.social_security_number+ \"
GPA:\"+this.GPA);
}
public boolean equals( Student S )
{
boolean ans=false;
if(this.name.equals(S.name) && this.social_security_number.equals(S.social_security_number)
&&this.GPA==S.GPA)
{
ans=true;
}
return ans;
}
void setName() {
throw new UnsupportedOperationException(\"Not supported yet..
Can someone explain this whole problem to me in detailed steps I un.pdfAmansupan
Can someone explain this whole problem to me in detailed steps? I understand everything up
until line 5 to 6... I don\'t understand how the i is taken out of the numerator and how an i
randomly appears in the denominator. Clarification/more detailed steps from lines 4 and on
would be greatly appreciated.
Solution
i appears in denominator as for e^ix-e^-ix gives 2i*sinx so he divided by 2i for
cancelling in 4th step he multiplied denominator with i and taken common - sign out in 5th step
rationaliging has been done in 6th step he taken 5 common and multiplyed denominator with 2
and on considering 2i common in numerator he taken 2i and multiplied and divided with i for
that whole term 2i in th 6th step so that in numerator 2i becomes -2 and denominator 2 becomes
2i in 7th step he used e^ix and e^-ix values as they are cosx+isinx and cosx-isinx respectively
and bye substitution and calculation in 6th step we got 7th step simplified answer.
Can someone please explain the gauss theorem on the field of complex.pdfAmansupan
Can someone please explain the gauss theorem on the field of complex numbers?
Solution
Answer: Gauss gave the first clear exposition of complex numbers and of the investigation of
functions of complex variables in the early 19th Century. Although imaginary numbers involving
i(the imaginary unit, equal to the square root of -1) had been used since as early as the 16th
Century to solve equations that could not be solved in any other way, and despite Euler.
Can someone please explain these to me Let T R 3 rightarrow R 4 be .pdfAmansupan
Can someone please explain these to me? Let T R 3 rightarrow R 4 be a linear transformation
such that the only solution to T(0) = 0 is the trivial solution.
Solution
a) T is one-to-one beacause there is only 1 trivial soution available.
b) no because there is no other information given.
Can someone please explain what a Poisson Process is and what its .pdfAmansupan
Can someone please explain what a Poisson Process is and what it\'s used for?
Solution
The basic form of Poisson process, often referred to simply as \"the Poisson
process\", is a continuous-time counting process {N(t), t = 0} that possesses the following
properties: N(0) = 0 Independent increments (the numbers of occurrences counted in disjoint
intervals are independent from each other) Stationary increments (the probability distribution of
the number of occurrences counted in any time interval only depends on the length of the
interval) No counted occurrences are simultaneous. Consequences of this definition include:
The probability distribution of N(t) is a Poisson distribution. The probability distribution of the
waiting time until the next occurrence is an exponential distribution. The occurrences are
distributed uniformly on any interval of time. (Note that N(t), the total number of occurrences,
has a Poisson distribution over (0, t], whereas the location of an individual occurrence on t ? (a,
b] is uniform.) Other types of Poisson process are described below.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Case Project 12-2 Devising an AD DS Design with RODC, AD RMS, and A.pdf
1. Case Project 12-2: Devising an AD DS Design with RODC, AD RMS, and AD LDS This project
can be done in groups. Designs should be presented, with discussion of imple- mentation details.
Create a fictitious multilocation company using Windows Server 2008 Active Directory as its
primary directory service. Describe the company’s line of business and explain why it will
benefit from using the following role services and how they will be used: • AD DS • AD LDS •
AD RMS • RODC • DNS Keep in mind that the main goal of this project is to create a company
in which these role services should be used. Create a diagram showing where servers will be
located and which roles will be installed on the servers, and include information about sites.
Write doc- umentation explaining why each role service is needed, and include information such
as which servers will be global catalog servers and which servers will perform FSMO roles.
Present your project to the class, along with a detailed diagram showing sites, servers, role
services, and so forth.
Solution
Server Manager in Windows Server 2008
The first two improvements for Active Directory I am going to discuss really aren't changes in
Active Directory Domain Services (ADDS); rather, they are changes in Windows that will
change the way you manage Active Directory. The first, the new Server Manager, shows up as
soon as you boot your Windows Server® 2008 server for the first time. (The second is the Server
Core installation, which I'll get to in a moment.)
Server Manager will probably look familiar to you from the Configure Your Server Wizard in
Windows Server 2003, which comes up by default after you install Windows Server 2003. That
version, however, isn't very useful for day-to-day administration, and everyone I know checks
the "Don't display this page at logon" box.
Server Manager in Windows Server 2008, on the other hand, is quite useful (see the article by
Byron Hynes in this issue of TechNet Magazine for an overview of Server Manager). First, as
you can see in Figure 2, Server Manager is now a Microsoft® Management Console (MMC)
snap-in rather than a Microsoft HTML Application (HTA). This means it has a full-featured user
interface that is familiar and easy to customize. Out of the box, Server Manager lets you manage
the installation of server roles (major services such as DNS, ADDS, and IIS) and features
(software components, such as the Microsoft .NET Framework, BitLockerTM drive encryption,
and Windows PowerShellTM). Beyond the ability to add and remove software, Server Manager
also provides a single point of contact for running diagnostic tools (such as the Event Viewer and
PerfMon) and system configuration utilities (such as Device Manager and the Windows Firewall
2. snap-in). If you add in the MMC snap-ins for Active Directory—for instance, Users and
Computers, Domains and Trusts, and Sites and Services—you'll have a pretty nice interface to
perform day-to-day management of your Windows Server 2008 domain controller (DC).
Figure 2 Server Manager in Windows Server 2008 (Click the image for a larger view)
Windows Server 2008 Server Core
Windows Server Core is a new Windows installation option that provides a trimmed-down
version of Windows containing only the components necessary to run certain key server roles,
including Active Directory Domain Services. (Figure 3 lists the roles supported by Server Core.)
Although a Server Core installation has a graphical UI, it doesn't run the Windows desktop shell
and almost all of the graphical tools for managing and configuring Windows are absent (see
Figure 4). In their place, you get a command window and a terrible feeling in the pit of your
stomach that you don't know what to do next. How do I change the computer name? How can I
configure a static IP address?
Figure 4 There's not much to see in the Server Core UI (Click the image for a larger view)
The first few minutes in front of a Server Core installation can be unsettling. But after a little
time re-familiarizing yourself with WMIC, NETSH, and NETDOM, you'll be able to do all the
usual setup and configuration tasks with no difficulty. And you still get Regedit and Notepad to
satisfy your graphical tool needs.
The main advantage to Server Core is that much of the code you get with a typical Windows
installation, which you may not need for these core server roles, is removed. This reduces the
potential attack surface for malware (a good thing) and reduces the amount of patching and
rebooting you'll have to perform on your DCs (an even better thing). And you get a much
smaller disk footprint and reduced hardrive requirements—these aren't usually a big deal, but it
can be a help in virtualized server environments.
Will the lack of graphical utilities make managing ADDS difficult? Not at all. You can perform
almost all of your management tasks remotely by running the utilities on your workstation and
connecting to the domain controller over the network. I expect that the vast majority of DCs will
eventually be running on Server Core installations.
DCPROMO Changes
The first change you'll notice in ADDS itself is the new DCPROMO. It works the same as
DCPROMO in Windows Server 2003, but it's been completely rewritten to make it easier to use.
For instance, you don't have to enter your domain administrator credentials—DCPROMO can
use the credentials of your current login to promote the server. Nor do you have to type
DCPROMO /ADV to get the Advanced Mode DCPROMO options—now there's a checkbox on
the first DCPROMO dialog to enable these options. Advanced mode also lets you select the
existing domain controller to replicate from. This means you can keep the replication load of
3. DCPROMO off of your production DCs.
When you promote a DC into a new domain or forest, DCPROMO gives you the option to set
the forest and domain functional level, rather than having you do this later. You can also specify
the Active Directory site you want to place the DC in during the promotion process, which is
very useful in the unattended DCPROMO scenario. DCPROMO will even suggest the best site
for the DC based on the DC's IP address.
The new DCPROMO also collects all of the configuration options onto a single page, providing
one place where you choose whether the new DC will be a global catalog (GC), a DNS server, or
a read-only DC. You don't have to go to an obscure location in the Active Directory Sites and
Services snap-in to mark the DC as a GC.
But perhaps the nicest feature in the new DCPROMO is the ability to save all the DCPROMO
settings in a response file just before the promotion process starts. This is much simpler—and
less error-prone—than cobbling up the response file by hand. You can then use the response file
to perform unattended DCPROMOs on other servers. And for you script fanatics, all of
DCPROMOs options are now accessible from the command line.
Read-Only Domain Controllers
In the early days of Active Directory, enterprises often deployed domain controllers at every site
at which users might log in. This was common in banks, for instance, placing a DC in every
branch office. The logic was that users at the branch office would be able to log in and access
local network resources even if the WAN failed.
At the time, the need for physical security of DCs wasn't well understood. I saw domain
controllers tucked beneath desks where they could easily be accessed by people walking by. It
wasn't until a few years later that Active Directory architects fully comprehended the security
risk that an unsecured DC creates, and IT organizations started consolidating their DCs back into
more centralized datacenters. Branch office users then had to authenticate over the WAN, but it
was a worthwhile trade-off for the added security.
Active Directory in Windows Server 2008 changes the equation with respect to branch office
deployments by introducing read-only domain controllers, or RODCs. These represent the
biggest change in Windows Server 2008 Domain Services.
The Active Directory team focused on the requirements of the branch office scenario when they
designed the RODC and they adopted the goal of "What happens in the branch office, stays in
the branch office." The point is that if you deploy a DC in a physically insecure branch office,
there's ultimately nothing you can do to prevent the DC (and the machines that trust that DC)
from being compromised, but you can prevent that compromise from spreading from the branch
office out to the rest of the domain.
Note that even though they constitute a huge change to the ADDS infrastructure, RODCs are
4. quite straightforward to implement. Your domain must be at Windows Server 2003 forest
functional level, and there must be at least one Windows Server 2008 DC in the domain. And
beyond simply being a branch-office solution, RODCs make sense in Internet-facing
environments and in situations where the DC is placed in the network perimeter.
DC Gone AWOL
There are several classes of threats to consider in a branch office. The first is the "stolen DC"
scenario, where someone walks off with the DC or the disk of the DC. Beyond the local service
disruption, the risk is that the attacker ultimately gains access to all of the user names and
passwords in the domain and from there elevates his privileges to gain access to protected
resources or cause a denial of service. To address this threat, RODCs, by default, don't store the
password hashes in the Directory Information Tree (DIT) of the RODC. So to authenticate a user
to the domain, when a user first authenticates to a particular RODC, the RODC passes the
request to a full domain controller (FDC) in the domain. The FDC processes the request and, if
successful, the RODC issues a replication request for the password hash.
A compromised RODC could potentially request password hashes for sensitive accounts. To
prevent this, the domain administrator can configure a password replication policy for each
RODC. The password replication policy is made up of two attributes on the RODC's computer
object. The msDS-RevealOnDemandGroup attribute contains the distinguished names of groups,
users, or computer accounts whose passwords may be cached on the RODC (these are typically
the users and computers in the same site as the RODC). The msDS-NeverRevealGroup contains
the distinguished names of groups, users, or computer accounts whose passwords may not be
cached on the RODC (for instance, the domain administrator account should never have its
password hashes cached on an RODC). When the RODC requests the password hash for a
particular account, the FDC evaluates the request against the password replication policy to
determine whether the password hash should be replicated to the RODC. When a DC is stolen,
this limits the vulnerability to those passwords that happen to have been cached on the stolen
RODC at the time it was removed from the network, and it eliminates the possibility of a critical
password being compromised.
The RODC computer object contains two other attributes to help you determine exactly which
accounts should have their passwords cached. The msDS-AuthenticatedAtDC attribute lists the
accounts that have been authenticated to the RODC, and the msDS-RevealedList attribute names
the accounts whose passwords are currently stored by the RODC.
User and computer password hashes are not the only secrets stored on a DC. The KrbTGT
account contains the keys for the Kerberos Key Distribution Center (KDC) service running on
each domain controller. In a typical scenario, each KDC in the domain shares the same KrbTGT
account, and it is possible that an attacker could retrieve these keys from a stolen DC and use
5. them to attack the rest of the domain. However, each RODC has its own KrbTGT account and
keys, eliminating that possibility.
It is also not unusual for applications to store passwords or other secrets in the DIT. If an attacker
were to steal a DC, she could possibly steal these application passwords and use them to gain
access to the applications. To mitigate this risk, Windows Server 2008 Domain Services allows
administrators to define the Read-Only DC Filtered Attribute Set (RO-FAS). Attributes that are
part of the RO-FAS are never replicated to RODCs, and thus they can't be retrieved from a
compromised DC. You assign attributes to the RO-FAS by setting bit 9 (0x0200) of the
searchFlags attribute of the corresponding attributeSchema object in the schema.
Barbarians inside the Gate
Another class of threat for branch office domain controllers is the case of a local server
administrator elevating his privilege by leveraging the DC's privileges to gain access to other
domain resources or to engineer a denial of service attack. Again, if the local administrator has
physical access to the domain controller, there's little that can be done to prevent compromise.
But it is possible to prevent the attacker from using the branch office domain controller to
compromise other DCs in the domain.
RODCs are not trusted as domain controllers by the full DCs in the domain. From a trust
standpoint, FDCs treat RODCs as member servers in the domain. An RODC is not a member of
the Enterprise Domain Controllers or Domain Controllers groups. The RODC account has very
limited ability to update anything in the directory, and therefore even if an attacker does
compromise the RODC account, she'll gain almost no useful privileges.
RODCs don't even show in the normal DS replication topology. Because RODCs look like
normal member servers rather than domain controllers, the Knowledge Consistency Checker (the
KCC, which is the process on each DC responsible for calculating the DS replication topology)
won't build connection objects from RODCs. No full DC or RODC will try to replicate from an
RODC. On the other hand, the RODC will create a connection object representing an inbound
replication agreement from a full DC, but this connection object only exists in the RODC's
replica; no other DC has a copy of that connection object. From a replication standpoint, RODCs
are like Roach Motels for directory objects. Objects replicate in, but they don't replicate out.
Administrative Role Separation on RODCs
It's very common for a branch office DC to be managed by a local server administrator who
does everything from running backups on the domain controller to cleaning keyboards. But it is a
security risk to grant a remote site administrator the rights necessary to do general maintenance
on a domain controller, and the site admin can potentially elevate her privileges in the domain.
RODCs provide two kinds of administrative role separation to mitigate this threat.
With the first form of role separation, the domain administrator can promote the RODC in the
6. normal way using DCPROMO, or she can use a two-step process where the actual promotion
process is securely delegated to the branch site administrator, without granting any domain
administration rights. The domain administrator pre-creates the RODC computer account in the
domain using the Active Directory Users and Computers MMC snap-in, as shown in Figure 5.
Figure 5 Pre-creating the RODC computer account (Click the image for a larger view)
Selecting "Pre-create Read-only Domain Controller account" runs an abbreviated version of
DCPROMO that performs all the tasks that require administrative access to the domain,
including creating the computer account, assigning the RODC to a site, specifying the DC's
roles, specifying the password replication policy, and defining the user or group that will need
the rights to complete the DCPROMO operation on the RODC. The delegated administrator or
group is stored in the managedBy attribute of the RODC computer object.
The delegated administrator can then run DCPROMO on the server itself. DCPROMO will
detect the pre-created account and turn the server into an RODC. Running DCPROMO in this
way does not require domain administrator credentials.
The second way RODCs provide administrative role separation is by creating local
administrative roles on the RODC itself. These roles look like machine local groups—they are
stored in the registry of the RODC, and they can only be evaluated on the RODC. But instead of
using the Computer Management MMC snap-in to manage them, the administrator manages
local RODC roles using NTDSUTIL. Figure 6 lists the local administrative roles on an RODC.
These roles correspond one-for-one with the built-in groups in Windows.
Figure 6 Local RODC administrative roles
RODC Oddities
Because RODCs are read-only and no other domain controller will replicate from them, RODCs
exhibit some unexpected behaviors. For instance, lingering objects—meaning objects that have
been deleted everywhere else but on a particular DC because the DC was unable to replicate for
longer than the tombstone lifetime of the forest—are normally detected by the outbound
replication partners of the DC. But since RODCs have no inbound replication partners, there is
no lingering object detection for them.
RODCs will not service LDAP update (add, modify, delete, rename, or move) operations.
Instead, RODCs return an error with an LDAP referral to a writable DC that can service the
operation. If the application that issued the LDAP update doesn't properly handle the referral
operation, the application could fail.
Finally, if a user from another domain in the forest attempts to authenticate to an RODC, the
RODC must be able to access a full DC in its own domain in order to obtain the trust password
to properly pass the authentication request to the DC in the user's domain. If the network
connection between the RODC and the full DC in its domain is unavailable, the authentication
7. will fail.
Fine-Grained Password Policies
The ability to define more than one password policy in the domain was probably the most-
requested feature for Windows Server 2008 ADDS. As you probably know, in Windows 2000
and Windows Server 2003 Active Directory, each domain supports only a single password policy
that is applied to all security principals in the domain. If you need a separate password policy for
a specific group of users, you have to create a separate domain. But now a new feature in
Windows Server 2008 ADDS, called Fine-grained Password Policies, lets you define multiple
password policies in a domain.
The new strategy uses groups to apply fine-grained password policies to users. You first define
the fine-grained password policy by creating a new msDS-PasswordSettings object in the
CN=Password Settings Container, CN=System, DC= container. The msDS-PasswordSettings
object (PSO for short) contains attributes that parallel the password policy setting in Group
Policy (see Figure 7).
Figure 7 Attributes in the mSDS-PasswordSettings object
You then assign the password policy to users or groups by adding the user or group names to the
multi-valued mDS-PSOAppliesTo attribute of the PSO. Once you accept the idea that you don't
apply password policies to OUs, it's pretty straightforward. But there is some additional
complexity.
Users are usually members of many groups. So what happens if there are multiple conflicting
password policies associated with a user because of these group memberships? In this case,
ADDS uses a precedence evaluation to determine which password policy should be applied. It
works like this:
User objects have a new attribute called msDS-ResultantPSO to help sort out exactly which PSO
applies to a user. This attribute contains the distinguished name of the PSO that governs the
password of that user.
Fine-grained password policies give you more flexibility than you could ever need, but you must
manage these policies carefully and keep them simple. There is no in-the-box utility for defining
fine-grained password policies; you will either need to use ADSIEdit or find a third-party utility.
Restartable Active Directory Service
Every time you take a domain controller down for DIT maintenance you cause some disruption
in your network service levels. Windows Server 2008 DCs have a new feature that lets you stop
the directory service without completely shutting down the DC.
The NET STOP NTDS command stops ADDS on a Windows Server 2008 DC. When you do
this, the Local Security Authority (LSASS) process on the DC continues to run, but it unloads all
the ADDS-related DLLs and the directory service becomes unavailable. LSASS then behaves
8. essentially as it would on a member server by forwarding domain authentication requests to a
DC. Because the DLLs that handle ADDS are unloaded, you can apply ADDS-related patches or
perform an offline defrag of the DIT. Starting ADDS is as simple as NET START NTDS.
Restoring the DIT from a system state backup still requires you to boot into directory service
repair mode, however.
It's important that you understand that the directory service is not a real Windows service. It is
still an integral component of LSASS and you can't stop LSASS without shutting down the
machine. But the ability to start and stop the directory service in Windows Server 2008 is a
convenient option.
Backup and Recovery
The entire backup and restore mechanism has been revamped in Windows Server 2008. I won't
go into all the details here, but the new Windows Server Backup has some changes that affect
ADDS.
Windows Server Backup is a volume-based backup solution, meaning it backs up entire disk
volumes at a time. It also only backs up to disk (or disk-like) devices—there is no tape support.
There is a system state backup option for the WBADMIN command line backup utility. Using
the WBADMIN START SYSTEMSTATEBACKUP command, you can now create a backup
image that contains all the critical system files necessary to restore Active Directory on a domain
controller. There is, however, a potential for as many as five volumes in the backup set, but the
volumes in the backup set will contain only the files needed for a system state restore. Even more
annoying is that, as of the RC0 build of Windows Server 2008, you cannot perform a system
state backup to a network share. You must have a local disk volume available to store system
state backup images, and that volume must not be part of the system state backup volume set.
You may have to add a new disk volume to every domain controller on which you perform
system state backups.
Performing a system state restore is simple. Just boot the DC into Directory Services Restore
Mode and run the WBADMIN START SYSTEMSTATERECOVERY command. The result is a
non-authoritatively restored DIT, on which you can authoritatively restore specific objects using
NTDSUTIL, just as you did in Windows Server 2003.
One aspect of Windows Server Backup deserves special mention: it stores backup images in
Virtual Hard Disk (VHD) format. This is the same format that Microsoft Virtual Server 2005
uses to store its virtual disk images. This means you can take a backup image created with
Windows Server Backup and mount it as a disk drive in a virtual machine running under
Microsoft Virtual Server. You can then browse the backup contents as if it were a normal disk
drive!
Another change regarding ADDS backup is the ability to use the Volume Shadow Copy Service
9. to create point-in-time snapshots of Active Directory. When you create a snapshot using
NTDSUTIL, the Volume Shadow Copy Service saves the before-image of each disk block of the
DIT before it is overwritten by an update operation. By combining the saved before-images with
the current version of the DIT, the Volume Shadow Copy Service can construct a complete
snapshot of the DIT with very little overhead. A typical snapshot takes only a few seconds to
create, regardless of the size of the DIT.
By itself, this is an interesting capability, but not all that useful. However, in Windows Server
2008, ADDS includes a command-line utility called DSAMAIN that mounts the snapshot image
in read-only mode. This provides a standalone LDAP server, much like an ADLDS instance that
contains the contents of your directory at the time of the snapshot. You can browse the directory
using the LDP utility or other LDAP tools and retrieve versions of directory objects from an
earlier point in time.
SYSVOL Replication with DFS-R
Windows Server 2003 R2 featured a revamped Distributed File Service (DFS) that incorporated
a brand-new file replication mechanism called DFS-R. It uses remote differential compression,
which substantially reduces file replication traffic by determining which blocks of a target file
need to be replicated to bring it into sync with the source file. However, Windows Server 2003
R2 still uses File Replication Service (not DFS-R) to replicate SYSVOL between domain
controllers. Because of this, SYSVOL replication continued to be a source of problems for
Active Directory administrators.
When running at the Windows Server 2008 domain functional level, Windows Server 2008 can
replicate SYSVOL using DFS-R, improving the speed and robustness of SYSVOL replication.
And this makes it reasonable to place large files in SYSVOL to make them available on all DCs.
To use DFS-R for SYSVOL, you must first migrate the old SYSVOL data to DFS-R using the
DFSRMIG utility. This process has four steps:
Depending on the size of your SYSVOL and the number of domain controllers you have, this
process may take a while, but the improved performance and reliability make the effort well
worth your while.
Auditing Improvements
The auditing system in Active Directory for Windows Server 2003 is both a blessing and a curse.
On the one hand, it provides a pretty comprehensive, flexible, and secure solution for tracking
changes in the directory. But some may argue that it suffers from several significant usability
problems.
Enabling auditing of directory changes on a Windows Server 2003 domain controller is pretty
much an all-or-nothing affair—it's either on or it's off. And the volume of audit traffic on a
busy enterprise DC can render auditing impractical. Configuring the auditing system to produce
10. the messages that you really need by fiddling with individual security descriptors is tedious and
prone to error. The audit messages themselves are often cryptic, and in many cases don't contain
the information you need, such as the before and after values of changed attributes. And
collecting, correlating, and archiving the messages from multiple domain controllers is not really
feasible using the native Windows tools.
The directory services auditing system in Windows Server 2008 addresses some of these
problems. First, there are four new audit subcategories for directory service auditing: DS Access,
DS Changes, DS Replication, and Detailed DS Replication. So if you want to just audit directory
changes, you don't have to wade through all of the read and replication events. But, if you want
to include object deletions in your audit log, you must enable DS Access. This generates
messages for all DS object accesses, essentially putting you back to generating too many
messages. And it is still up to you to configure the security descriptors to generate the audit
messages that you want for the objects you care about.
The audit messages have been substantially cleaned up so that they are both readable and contain
the data you need. In particular, directory changes generate audit log entries that contain the old
and new values of changed attributes. This is a huge improvement. The only downside here is
that the old and new values appear in separate audit log entries, so you have to correlate them to
really understand the change that was made. Many add-on audit-log collection products,
including the Microsoft Audit Collection Services, support this kind of correlation.
UI Improvements
The Active Directory Users and Computers, Sites and Services, and Domains and Trusts MMC
snap-ins have always been adequate for managing Active Directory. In Windows Server 2008,
the basic admin tools have been cleaned up and introduce a couple of nice new features. If you
enable Advanced Features, the Properties dialog for each object displays an additional tab titled
Attribute Editor. This is the same attribute editor tab used by ADSIEdit, which lets you inspect
and edit all of the attributes of the object. The tab itself now offers better decoding of encoded
attributes, such as the userAccountControl attribute. Figure 8 shows how seamlessly the attribute
editor is integrated.
Figure 8 Attribute Editor in Active Directory Users and Computers (Click the image for a larger
view)
Wrapping Up
Aside from the key points I've discussed in this article, there are many other improvements
you'll find in ADDS in Windows Server 2008. For instance, the KDC uses the 256-bit Advanced
Encryption Standard (AES-256) if the domain is in Windows Server 2008 domain functional
level. You can enable Accidental Deletion Prevention of objects by checking the appropriate box
on the Object tab for any DS object. The Extensible Storage Engine that provides the data
11. management service has been enhanced to use single-bit error correction, reducing the likelihood
of a hardware or software error in the disk subsystem from corrupting the DIT. The DNS service
starts processing requests before it has completely loaded the DNS database. The DC Locator
module has been enhanced so that if it fails to find a DC in the desired site, it will try to locate a
DC in the next nearest site instead of simply using any DC it can find in the domain. And
NTDSUTIL now supports RODCs and Volume Shadow Copy Service snapshots.
Clearly, Windows Server 2008 provides a substantial number of improvements in Active
Directory Domain Services. Taken together, these changes will significantly improve the
security and manageability of ADDS. The best thing, however, is that integrating Windows
Server 2008 into your Active Directory environment doesn't involve a massive migration—it's
an easy and incremental process.