|
|
CIS 303a - Computer Architecture
Review for Third Test
The following questions are provided to help you study for the third test. Do not expect to see these exact questions on the test.
- The second part of chapter 12 discussed file migration. What is a reason that would cause you to think it is a good idea to move files farther away from users?
- What are the generations of a file sequence called in the hierarchical system used in the text?
- What is an archive bit?
- Which backup methods generally set the archive bits of the files it backs up to OFF?
- Which backup method copies only files changed since the last full back up?
- Which backup method copies only files that were changed since the last backup of any kind?
- Why does RAID 0 not provide any fault tolerance? What does it provide?
- What is fault tolerance, with regard to most RAID methods?
- What does the text mean when it says a file is in secondary storage?
- Which kind of storage server has to have more general computing power, a SAN server or a NAS server?
- Which kind of storage server is attached to the same general network as the rest of the devices at your location?
- Which kind of storage server provides access to files like they are on any other kind of server in the network?
- What is the main difference between a peer-to-peer network and a client-server network? Which kind of networks are generally used for PCs?
- What are the layers used for in a three layer network architecture? (What are the layers?)
- What are the protocols for in an application's protocol stack?
- If we are connecting to a network resource with a static connection, what two names do we need to know?
- What must the OS do with regard to a static connection when your computer boots up?
- How are dynamic connections to resources generally found or reestablished?
- Does the Word Wide Web work more like a static or dynamic connection system?
- Which kind of connection system uses a resource locator and a resource registry?
- What is the name of the directory service standard that was created by the ITU?
- What directory service system is generally used in Microsoft networks?
- Order the following hierarchical units according to the LDAP standard depicted in the text: country, organization, organizational unit, root
- What are the two parts of the kind of socket that is used to access a service on the Internet?
- What is the networking advantage to using named pipes, as opposed to pipes?
- What is the purpose of a remote procedure call?
- What are two concerns that you should consider when deciding to run an application across the Internet?
- When would a network administrator be involved in acquiring new equipment?
- According to the text, what is a good definition for a capital expense?
- How is an operating expense different from a capital expense?
- What are the four tests given in the book that classify resources as infrastructure resources?
- What are some arguments you can make for standardizing network service offerings? Why are non-standard services billed differently than standard services?
- Give some examples of infrastructure resources.
- Before preparing a Request for Proposal, what information should be presented in a business case to your change control board?
- What should be included in your statement of technical requirements for your RFP?
- Whether you publish your RFP or send copies to vendors, what are you asking them to do with regard to the RFP?
- Which step in the RFP process follows receipt of the responses from the vendors?
- Which should be the last step in the RFP process?
- What does it mean to validate a response to an RFP?
- What are some of the things a system administrator should be concerned about protecting, with regard to security issues?
- What is auditing, with regard to computer security?
- What is the difference between a worm and a more common computer virus?
- What should a system administrator be concerned about updating on regular basis, besides anti-virus software?
- What are the two kinds of network firewalls, with regard to established connections between devices? Which one would be considered to be the more secure?
- What can a system administrator buy and install that would improve the electrical current delivered to computer systems?
- Why are computer rooms typically kept colder than other rooms in a workplace?
- What are some reasons for having raised floors in a data center?
- What is the reason the use of Halon systems is now restricted? Can they be used at all?
- What is the reason for storing backup data at a location other than your regular business location?
- What should your alternate locations include besides a copy of a recent data backup?
|