Explain when a system administrator uses linux special permissions and the benefits of using special permissions.

Review the article Managing User Accounts on Linux at https://news.softpedia.com/news/Managing-User-Accounts-on-Linux-36645.shtml
Discuss the different strategies used to manage user accounts.
Explain which strategy you prefer and why.
Explain when a system administrator uses Linux special permissions and the benefits of using special permissions.

Using packet tracer implement the large network with five routers figure 1 shows using static routing.

Step 1. Using Packet tracer implement the large network with five routers Figure 1 shows using static routing.
Step 2. Design the network (determine subnets, masks, and IP addresses)
Step 3. Connect three hosts (PC-1, PC-2, and PC-3) on the edges of the network (as shown by the Figure) and show that all hosts can connect to each other (e.g., using ping).
Report the following:
1. Show the design of your network (including subnets, masks, IP addresses). (15%)
3. Show proof of connectivity using ping (between all PCs) (10%)
4. Screenshot of all router’s routing tables. (15%)
5. Upload your packet tracer project file. (10%)
*To configure a static route you can use: IP route
Repeat steps 1-3 to configure the network topology Figure 1 shows but this time dynamically using the RIP algorithm and DHCP. Please answer and submit the following:
1 Show your configuration of PC1, PC2, and PC3 as DHCP clients and the corresponding routers as DHCP servers. (5%)
2 Show proof of successful connectivity between all your PCs (10%)
3 Screenshots of your router’s routing tables. (15%)
4 Screenshots of the IP addresses assigned to all PCs and routers’ interfaces. (10%)
5 Upload your packet tracer project file (10%)