Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Assignment: Procedure Guide on Restoring a System Assignment Requirements: Part

ID: 3910816 • Letter: A

Question

Assignment: Procedure Guide on Restoring a System Assignment Requirements: Part of implementing Ken 7 These procedures will guide administrators in recovering a failed computer to a condition as near to the point of failure as possible.T both downtime and data loss. You have already implemented the following backup strategies for workstation computers: Windows' new encerprise resource planning (ERP) software is setting up a new recovery procedure for each type of con he goal is to m All desktop workstations were originally installed from a single image for Ken 7 Windows standard workstations. The base image is updated with a and new software installed on live workstations. Desktop workstation computer execute a backup of identified folders that contain new and modifited files every night at 1:00 a.m. Desktop workst backups generally take less than 10 minutes Using the format below, describe the steps necessary to recover a desktop workstation computer that encounters a disk drive failure at 5:30 a.m. The user arrived at work and found that the computer would not boot. Answer the following questions: 1. How much data has been modified between the last backup and the time of failure? 2. What images are necessary to recover the workstation? 3. What are the steps necessary to fix the problem that cause the data loss? 4. What steps should Ken 7 take to avoid a reoccurrence of this issue in the future? Submission Requirements . Format: Microsoft Word Font: Times New Roman, 12-Point, Double-Space Citation Style: APA Style with 3 references Length: 2-3 pages

Explanation / Answer

the steps necessary to recover a desktop workstation computert that encounters a disk failures are:-

Modify the Registry using the appropriate tool.

This objective is necessary because someone certified in the use of Windows NT Workstation technology must understand the NT Registry and the tools that can be used to modify it. These include the Control Panel, REGEDIT.EXE, and REGEDT32.EXE.

The Boot Sequence

Your computer begins the boot sequence after the Power On Self Test (POST) completes itself. When you turn on the power to your computer, the first series of messages you see are hardware related and are not associated with the boot process. Your memory is tested, for example, and then your bus structure is tested. Your computer runs a series of tests. These tests signal to peripheral devices and sense their replies to check for successful I/O performance. You may see a series of messages stating that your mouse and keyboard are detected, noting the appearance of an IDE drive, indicating whether a SCSI adapter is detected, providing response from any devices on that SCSI chain, and so forth. Failure at this stage isn't a boot sequence problem.

The boot sequence initiates when the hard drive's master boot record (MBR) is read into memory and begins to load the different portions of the Windows NT operating system. Windows NT Workstation runs on different microprocessor architectures. The exact boot sequence depends on the type of microprocessor on which you have installed Windows NT Workstation.

The RISC Boot Sequence

A RISC computer contains the NTLDR software as part of its BIOS. Therefore, the boot phase of a RISC-based computer is both simpler and faster than the boot phase of an Intel x86 computer. A RISC computer keeps its hardware configuration in its BIOS, which obviates the need for the NTDETECT.COM file. Another item kept in firmware is the list of all valid operating systems and how to access them. This means that a RISC computer doesn't use a BOOT.INI file, either.

A RISC computer boots by loading a file called OSLOADER.EXE. After reading the hardware configuration from the BIOS and executing, OSLOADER.EXE hands off the boot process to the NTOSKRNL.EXE. Then the HAL.DLL is loaded, followed by the system file, which ends the RISC Windows NT boot process.

2.

Considerations for restored images

After the server is successfully restored, optionally disconnect the Windows Server 2012 installation media and restart the restored computer. Some considerations about restored system images:

Use the most recent successful backup, unless you know you need to select a historical point in time. The older the restored system image, the higher the chances the computer account password in AD will have changed from the one in the image, and you may have domain re-join issues that are difficult or impossible to resolve.

If you restore an older system image, shares may need to be manually re-created for folders that were shared after the date of the restored image.

Restoring system images of AD domain controllers (DCs) requires careful attention and especially in a domain with more than one DC.

3.Six Steps to Better Data Backup

Think Quicker Recovery Time, Not Quicker Backup

Maintain Sufficient Backup History

Be Sure to Backup Essential Data AND Applications

Have Off-Site or Online Backup

Fix Broken Access Controls on Your File Server – Many businesses have folders with confidential data residing on a file server with overly permissive access controls. Why take the risk of having a disgruntled – even former – employee access and misuse this data when access can be limited to only those in the company who need it?

Be Sure to Test Restores – It happens time and time again. Business owners think they have a data backup plan in place. Tapes are changed diligently each day and everything appears to be backed up and good to go. However, it turns out the backups haven’t been working for months, sometimes even years, right at the very moment they’re needed. Either the backups had become corrupt and useless or large segments of data were not being backed up. This happens often. Don’t let it happen to you.

4-STEPS CAN TAKEN BY KEN 7 AS:-

Although backups probably run quickly and are simple, restoring you environment from a catastrophic disaster can be very time consuming. Another option is to perform a complete backup of the computer.This includes the operating system an all items you’ll need to restore the operating system, all configuration settings, and all applications and data. A complete system backup generally takes a lot longer since you are backing up literally everything. It can also make the process of restoring computers much easier. You only need to create a complete system backup that includes all of the operating system and physical settings once. After that, you can either perform full server backups or backup up selected volumes or files and folders

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote