Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

project 1

5/29/24, 8:45 AM Assignment Information

1/5

IT 202 Project One Guidelines and Rubric

Competency

In this project, you will demonstrate your mastery of the following competencies:

Leverage components and features of common operating systems to meet organizational needs

Recommend the selection, implementation, and maintenance of common operating systems based on organizational needs and industry best practices

Scenario

You are a systems architect at a medium-sized publishing company with 130 employees. The company primarily publishes books, both in print and online. It also produces other kinds of

content, such as audiobooks, interactive reading material, and magazines. Your leadership has decided that it is time to either upgrade or adopt a new OS (e.g., Windows, Linux, macOS).

As the systems architect, you have the responsibility to determine which OS the company should implement. There are many aspects to consider when making this decision, including what

existing applications are used by employees on a frequent basis, cost, functionality provided, performance, vendor support, etc. To determine which OS should be implemented, you need to

complete a site survey. After comparing the different OS options in the site survey, you will develop a brief proposal on what OS (or hybrid) the company should implement to meet its

organizational needs.

Directions

Review the Company’s Organizational Needs

To make a well-informed decision, you should understand the company’s organizational needs. Before completing your site survey and writing your proposal, review the Organizational Needs

document linked in the Supporting Materials area below.

Complete a Site Survey

A site survey compares the three different operating systems that the company is planning to implement. To complete this task, use the Site Survey template linked in the Supporting Materials

area. Your site survey must have the following sections completed:

Operating Systems: Acknowledge what OSes are already used on site in your site survey. The type of OS already used and how many employees are using that OS can in�uence your

decision making.

Server: Determine whether the desktops are on a hardware or cloud-based server.

Although not required in this portion of the project, you may want to think about whether or not the server should be changed. This change could be recommended in your

proposal.

Standard Hardware for Operating System Types: Determine the minimum required hardware. This could include desktop and server.



5/29/24, 8:45 AM Assignment Information

2/5

Network Connection: Determine whether the network is wired or wireless.

Although not required in this portion of the project, you may want to think about whether or not the network connection should be changed. This change could be recommended in

your proposal.

Applications: Identify what software applications need to be supported by the OS. Your survey of what applications desktop users use most frequently will in�uence your decision

making, as some applications are not supported by certain OSes.

Write a Proposal

Your proposal will be used to inform leadership as to which OSes the company should implement based on the �ndings of your site survey. Your proposal needs to include the following:

Overview of Desktop Footprint: Identify desktop systems that need to be upgraded and other OSes that need to be considered in the environment. This includes the locations of the

desktop computers and any risks or vulnerabilities that need to be addressed.

Recommendation: Recommend which OS should be selected and implemented, as well as whether it should be on-premise or cloud-based.

Justi�cation: Justify your decision based on your site survey �ndings and course concepts. You can also consider the number of end users, cost, and hardware requirements as part of

your �ndings.

Implementation Diagram: Create a diagram of what the �nal roll-out of the OSes would be. Your diagram should show the number of desktops and users, locations, and departments. It

should be an upgraded version of what you found in the Organizational Needs document.

Although you can create a diagram within the Word document, it is recommended that you use a diagram application such as Visio, Lucidchart, or draw.io. Information on how to

use these services is in the Supporting Materials section. Keep in mind that you have to create only one diagram, so you do not have to use all applications. However, be sure that

you upload and paste your diagram into the Word document as part of your proposal section. You should not upload it as a separate �le.

What to Submit

To complete this project, you must submit the following:

Site Survey and Proposal

Your submission should be a Word document of the completed Site Survey template linked in the Supporting Materials area. Your submission should also include your 1- to 3-page proposal.

Your proposal should be at the end of the Site Survey area. Although not required, if you use any sources in your recommendations, cite them according to APA style.

Supporting Materials

The following resources may help support your work on the project:

Reading: Organizational Needs

This document will provide you with context on the company’s needs and industry best practices. As you review this document, you will learn about what the company currently uses when it

comes to hardware and software. Learning about the organization’s needs can help you make an informed decision on which OS to implement.

5/29/24, 8:45 AM Assignment Information

3/5

Template: Site Survey Template with proposal included

Use this template to compare the operating systems that the company can implement for its employees who use desktops. Then be sure to include your proposal at the bottom of the form.

Tutorial Resource: Microsoft: Add a Drawing to a Document

As part of your proposal, you need to include a diagram. This document provides step-by-step instructions for creating drawings using the tools available through Microsoft Of�ce. You do not

have to use Microsoft Of�ce to create the diagram, but it is an option.

Tutorial Video: draw.io—Quick Start Video

If you decide not to use Microsoft to create your diagram, you have the option to use draw.io. This video provides a demonstration of the tools and capabilities of draw.io.

Tutorial Video: Visio 2016

You can also choose to use Visio to create your diagram. This tutorial includes information that may be helpful to you when creating your diagram.

Tutorial: Getting Started in Lucidchart: The Basics

Lucidchart is another application for creating a diagram. This resource shows you how to use Lucidchart to create diagrams.

Project One Rubric

Criteria Exemplary (100%) Pro�cient (85%) Needs Improvement (55%) Not Evident (0%) Value

Site Survey: Operating

Systems Desktop

Exceeds pro�ciency in an

exceptionally clear, insightful,

sophisticated, or creative

manner

Acknowledges what OSes are

already used on site

Shows progress toward

pro�ciency, but with errors or

omissions; areas for

improvement may include

specifying the version of the

desktop OS

Does not attempt criterion 5

Site Survey: Operating

Systems Server

Exceeds pro�ciency in an

exceptionally clear, insightful,

sophisticated, or creative

manner

Determines whether the

desktops are on a hardware or

cloud-based server

Shows progress toward

pro�ciency, but with errors or

omissions; areas for

improvement may include

specifying the version of the OS

server

Does not attempt criterion 10

5/29/24, 8:45 AM Assignment Information

4/5

Criteria Exemplary (100%) Pro�cient (85%) Needs Improvement (55%) Not Evident (0%) Value

Site Survey: Standard

Hardware for Operating

System Types

Exceeds pro�ciency in an

exceptionally clear, insightful,

sophisticated, or creative

manner

Determines the required

hardware

Shows progress toward

pro�ciency, but with errors or

omissions; areas for

improvement may include

indicating all minimum

hardware, such as CPU,

memory, storage, and media

cards

Does not attempt criterion 10

Site Survey: Network

Connection

Exceeds pro�ciency in an

exceptionally clear, insightful,

sophisticated, or creative

manner

Determines whether the

network is wired or wireless

Shows progress toward

pro�ciency, but with errors or

omissions; areas for

improvement may include

specifying ethernet, cable, or

802.11

Does not attempt criterion 5

Site Survey: Applications Exceeds pro�ciency in an

exceptionally clear, insightful,

sophisticated, or creative

manner

Identi�es what software

applications need to be

supported by the OS

Shows progress toward

pro�ciency, but with errors or

omissions; areas for

improvement may include

describing how the hardware

and software compatibilities

align

Does not attempt criterion 5

Proposal: Overview of

Desktop Footprint

Exceeds pro�ciency in an

exceptionally clear, insightful,

sophisticated, or creative

manner

Identi�es desktops that need to

be upgraded and OSes that

need to be considered

Shows progress toward

pro�ciency, but with errors or

omissions; areas for

improvement may include

identifying the number of

desktops needed or specifying

the OSes and their versions

Does not attempt criterion 10

Proposal: Recommendation Exceeds pro�ciency in an

exceptionally clear, insightful,

sophisticated, or creative

manner

Recommends which OS should

be selected and implemented

Shows progress toward

pro�ciency, but with errors or

omissions; areas for

improvement may include

recommendations on whether

the OS should be on-premise or

cloud-based

Does not attempt criterion 15

5/29/24, 8:45 AM Assignment Information

5/5

Criteria Exemplary (100%) Pro�cient (85%) Needs Improvement (55%) Not Evident (0%) Value

Proposal: Justi�cation Exceeds pro�ciency in an

exceptionally clear, insightful,

sophisticated, or creative

manner

Justi�es decision based on site

survey �ndings

Shows progress toward

pro�ciency, but with errors or

omissions; areas for

improvement may include

specifying current operating

systems, server, network

servers, network media,

applications, and IP address

strategy

Does not attempt criterion 20

Proposal: Implementation

Diagram

Exceeds pro�ciency in an

exceptionally clear, insightful,

sophisticated, or creative

manner

Diagrams how

recommendations should be

implemented

Shows progress toward

pro�ciency, but with errors or

omissions; areas for

improvement may include

providing number of desktops

and users, locations, and

departments

Does not attempt criterion 15

Articulation of Response Exceeds pro�ciency in an

exceptionally clear, insightful,

sophisticated, or creative

manner

Clearly conveys meaning with

correct grammar, sentence

structure, and spelling,

demonstrating an

understanding of audience and

purpose

Shows progress toward

pro�ciency, but with errors in

grammar, sentence structure,

and spelling, negatively

impacting readability

Submission has critical errors in

grammar, sentence structure,

and spelling, preventing

understanding of ideas

5

Total: 100%

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Network Design and Plan Purpose

Please review attachment Mod 4 Project: Network Design and Plan Purpose In this module, we will introduce a course design project that will be completed in four parts during the course. This project provides you an opportunity to solve a comprehensive problem in firewall and virtual private network (VPN) implementation

Memecoins & Stablecoins Development

Please take a look at the attachment. Lab #3: Blockchain-Based Ecosystems: Memecoins & Stablecoins Development, Attack Simulation, and Auditing Lastname: ______________ First name:____________Date_______ TA_Prove_ Yes/No 1. Overview This lab guides students through designing, implementing, deploying, testing, and auditing a simple memecoin (ERC‑20) and a minimal ecosystem around it (liquidity pool,

Blockchain Presentation

presentation about a blockchain Term Project CIS 5730- Blockchain Application Project Guideline Part ii–Presentation Along with the project you will present what you did to the class in a short presentation. If you want, you can demonstrate the project, or just present an overview of what you did. Presentations should

Network Threats

  Questions: Below is a list of common network attacks: Distributed Denial of Service (DDoS) DNS poisoning ARP poisoning Domain hijacking MAC flooding MAC cloning Man-in-the-Middle Explain two of these network attacks and discuss methods/techniques for protecting the network against them.

Best Practices for Role-Based Privilege Management in Databases

  Research the best practices for managing and securing role-based privileges in databases and address the following questions in your discussion post:  What are the key challenges in managing role-based privileges, and how do they impact database security? Can you provide a real-world scenario where poor role-based privilege management led

Computer Science Cloud Computing assignment

Please see attachment for details 4 [ Note: To complete this template, replace the bracketed text with your own content. Remove this note before you submit your paper.] Cloud Computing Evaluation Paper 1 Cloud Computing [Differentiate between cloud computing models and their uses. What are the different types of deployment

Computer Science- Python Python Programming Assignment

Computer Science Python Programming Lab assignment help. Design a Python program that calculates a credit card customer’s minimum payment based on their balance. Please use If Else and elif statements in your code. You must add comments in your code. Please round the minimum payment to two decimal places using

Blockchain Application

I need help with my coursework project. Let me know if you need any help from me.  Lab 2: Blockchain-Based Academic Credentials Lab Lastname: ______________ Firstname:________________ 1. Overview AETHELRED UNIVERSITY Registrar’s Office wants to start issuing a digital transcripts and diploma for graduating students. You are called to build the

LOREM, IPSUM

The ability to develop a risk register is a skill needed by all cybersecurity leaders when assessing cybersecurity risks. A risk register provides a detailed listing of known risks as well as quantitative or qualitative assessments of those risks, resulting in the prioritization of action.

Virtual LANs

  Questions: A VLAN allows different devices to be connected virtually to each other as if they were in a LAN sharing a single broadcast domain. 1. Why a network engineer would want to deploy VLANs? 2. How do VLANs improve network security?

compliance and rules to follow in cybersecurity.

Follow the attached instructions to complete this work. Note: Make sure to follows rubric or aligns with Rubric. Unit 8 Assignment Directions: Case Study Review the following hypothetical case study. Consider the big-picture ideas and the specific concerns. Make use of the key terms and concepts from the readings in

Discussion on data ( computer science)

Follow the attached direction to complete this work Unit 7 Discussion   Overview Consider this scenario: PQR Corporation provides facial recognition technology to customers. Its products include customer access to consumer electronics as well as mass surveillance capabilities through networked camera systems. While operating legally, PQR has maintained a low

Computer Science – Machine Learning Python Programming Assignment

Assignment Help. Please don’t forget to add comments in the code Page 1 of 3 NorQuest College – CMPT 1011: Lab Assignment 5 CMPT 1011: Introduction to Computing Lab Assignment 2: Variables, mathematical operations and data types Value This coding challenge is worth 3% of your final grade. Background In

Public safety Communications

Subscribe The Communications and Cyber Resiliency Toolkit provides guidance for establishing resiliency measures, public safety communications can better withstand potential disruptions to service. This toolkit, developed by CISA, describes networks and systems critical to successful communication and cyber resiliency and possible threats while providing many resources and additional links for

Case Study 4 o Data (computer)

Follow the attached instructions to complete this work Unit 4 Case Study Directions Review the following case study. Consider both the big-picture ideas and the specific concerns. Make use of the key terms and concepts from the readings in your written responses to the questions below. The case study paper

Discussion 5 and 6

Follow  the attached instructions to complete this work Unit 5 Discussion   Overview In this discussion, you will be considering the emphasis on aspects such as privacy and safety. You will reflect on the significance of the legal concerns and goals of public-private partnerships to address cybersecurity. You will also

SQL injection

Hey! ????  I need an expert in SQL injection, DDOS attack, Code injection attack, XSS attack! To talk further please contact me on discord at mara411 so we can talk more freely and then I will hire you on here! Thanks ????