Be clear about which message you are responding to. Refer to specific passages or ideas in the course or text that have sparked your interest. Make sure your contribution adds something new to the discussion. A simple “I agree” may be your initial response, but think about how you can take the conversation to the next level. Use a minimum of 75 words each in response to the 4 classmate post.

IT117: Website Development


While Tim notices the websites he uses to find photos may not have the copyright symbol on them. The right thing to do is to contact the owner of the website and get the proper permissions to use the photos. Copyright infringement can destroy any credibility you have as a web developer and destroy your career before it even gets started. The ethical thing Tim should have done was trace the source of the photo and make sure it wasn’t owned by someone else. Tim could have done a simple google image search to trace the origins of the photo or us an app like Tineye to find out if it has a copyright or a creative commons licence. If it happens to have a CC license then there is a good possibility you can use it, but I would still contact the original owner and ask permission just to be on the safe side.



Tim would be allowed to edit and use the images provided by other websites through the Fair Use Doctrine if the site is solely intended for the benefit of the public. Fair use allows the use of copyright materials to be used without permission for the benefit of the public. Since this webpage is created on behalf of another small business for advertisement and information, he would not be protected under the Fair Use Doctrine. It would be implied that the use of this website would be to benefit the likelihood for increased sales of this small business; even if the website itself seems relatively harmless. Although there is not a specific copyright logo on the webpage, the contents originator still has a ‘limited” copyright to that content. The copyright owner has the exclusive rights to reproduce, display, prepare derivative materials, and distribute copies of the work to the public by sale, rental, lending to display the image. This fact applies whether the creator formally had the images registered, or not. The copyright law protects the contents originator from the moment the material is created; ranging from the start, to the complete and finished material. Simply citing image sources would not clear him from being subject to the copyright law, nor would citing image sources be required through the Fair Use Doctrine. If Tim were to get these images from a public domain, stock photo services, or through a creative commons license; the work would not be protected by copyright, and there would be no concern if the Fair Use Doctrine would apply for the images obtained through those sources, as these distribution types would be ethical. Tim could obtain and use the image sources ethically by contacting the website’s creator and/or owner and asking formally, in writing, for the expressed consent to use those images and abide by the agreed upon terms of each image used. That includes if he pays a one-time fee for the use of the content, he would not be the exclusive owner of the material, and subject to abide by the copyright laws.


IT261: Desktop Administration


To maintain a reliable and well-maintained storage space, you will need to understand the structure of most modern hard drives. Today we supply our employees with solid state drives (SSD) in their pcs. These no longer contain a mechanical motor driving platter that held the information of the older drives. Although with SSD there are still some basic file structures that was available on the older hard drive types, namely the Master Boot Record. This along with the GUID Partition Table (GPT) will be choices you will have to decide on when installing a new physical hard. Both file structures inform the pc of what the partitions look like and bootable.

MBR has been around since DOS 2.0 in 1983 and can run older versions of windows, but has some limitations (Hoffman, 2018). MBR can only work on disks up to 2 terabytes and will only allow 4 partitions per drive. Though there is a hack, make one of your partitions an extended one, and you can create more logical partitions within it. MBR also stored partition and boot data in one place, so if the data was overwritten or corrupted, you had better have a backup somewhere because that drive will not boot.

GPT on the other hand will allow you to have an almost limited amount of partitions, though that is dependent on the OS, and since we use Windows 10 you can have up to 128. Much more than you would ever reasonably need. Also, with GPT each drive is assigned a unique GUID which can help make it easier to manage for modern OS’s. For instance, it stores the partition and boot data in several places and can notice an issue, say a corrupt boot record, which it can recover data from one of the other boot sectors to repair.

Next, I would like to go over Virtual Hard Disks (VHD). They are used throughout our 3rd party application servers and on storage appliances within our network infrastructure. We prefer to run our application servers on 2 VHD appliances. The reason for this is we can take one set of them offline from the load balancer, update an application, and test it for a correct installation of the update. Then once we are satisfied, bring it back online, but after taking the other VHD offline first. VHD is also used in database storage much the same way we use it for application servers. But with these servers we usually employ dynamically expanding VHD. For the application servers we use fixed-size VHD. We also deploy VHD on some pcs for users that have a need to run different OS’s such as with our application development teams.



Both the globally unique identifier (GUID) and the master boot record (MBR) are known as partition types, or in Apples terms “partition schemes”. The MBR is what holds the data for the initial boot process and is typically found in the first sector of the hard disk drive. It’s also made up of the master partition table, disk signatures, and the master boot code. On Mac computers, the GUID is used for the startup and non-startup disks with Intel processors of OS x 10.4 or newer.

On the storage ends of things, every computer holds a virtual hard disk (VHD), which host the operating system and most other files on the system. The VHD is always going to be the largest amount of storage on a computer system. Now when it comes to protecting your information, Windows created a feature called Storage Spaces which helps to secure said data from drive failure. Essentially what it does is groups a few drives together and stores the information into a storage pool for safety precautions.


Looking for solution of this Assignment?


We deliver quality original papers

Our experts write quality original papers using academic databases.We dont use AI in our work. We refund your money if AI is detected  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity.We have ZERO TOLERANCE TO USE OF AI

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay