CIS 303a - Computer Architecture

Review for Third Test

The following questions are provided to help you study for the third test. Do not expect to see these exact questions on the test.

  1. The second part of chapter 12 discussed file migration. What is a reason that would cause you to think it is a good idea to move files farther away from users?

  2. What are the generations of a file sequence called in the hierarchical system used in the text?

  3. What is an archive bit?

  4. Which backup methods generally set the archive bits of the files it backs up to OFF?

  5. Which backup method copies only files changed since the last full back up?

  6. Which backup method copies only files that were changed since the last backup of any kind?

  7. Why does RAID 0 not provide any fault tolerance? What does it provide?

  8. What is fault tolerance, with regard to most RAID methods?

  9. What does the text mean when it says a file is in secondary storage?

  10. Which kind of storage server has to have more general computing power, a SAN server or a NAS server?

  11. Which kind of storage server is attached to the same general network as the rest of the devices at your location?

  12. Which kind of storage server provides access to files like they are on any other kind of server in the network?

  13. What is the main difference between a peer-to-peer network and a client-server network? Which kind of networks are generally used for PCs?

  14. What are the layers used for in a three layer network architecture? (What are the layers?)

  15. What are the protocols for in an application's protocol stack?

  16. If we are connecting to a network resource with a static connection, what two names do we need to know?

  17. What must the OS do with regard to a static connection when your computer boots up?

  18. How are dynamic connections to resources generally found or reestablished?

  19. Does the Word Wide Web work more like a static or dynamic connection system?

  20. Which kind of connection system uses a resource locator and a resource registry?

  21. What is the name of the directory service standard that was created by the ITU?

  22. What directory service system is generally used in Microsoft networks?

  23. Order the following hierarchical units according to the LDAP standard depicted in the text: country, organization, organizational unit, root

  24. What are the two parts of the kind of socket that is used to access a service on the Internet?

  25. What is the networking advantage to using named pipes, as opposed to pipes?

  26. What is the purpose of a remote procedure call?

  27. What are two concerns that you should consider when deciding to run an application across the Internet?

  28. When would a network administrator be involved in acquiring new equipment?

  29. According to the text, what is a good definition for a capital expense?

  30. How is an operating expense different from a capital expense?

  31. What are the four tests given in the book that classify resources as infrastructure resources?

  32. What are some arguments you can make for standardizing network service offerings? Why are non-standard services billed differently than standard services?

  33. Give some examples of infrastructure resources.

  34. Before preparing a Request for Proposal, what information should be presented in a business case to your change control board?

  35. What should be included in your statement of technical requirements for your RFP?

  36. Whether you publish your RFP or send copies to vendors, what are you asking them to do with regard to the RFP?

  37. Which step in the RFP process follows receipt of the responses from the vendors?

  38. Which should be the last step in the RFP process?

  39. What does it mean to validate a response to an RFP?

  40. What are some of the things a system administrator should be concerned about protecting, with regard to security issues?

  41. What is auditing, with regard to computer security?

  42. What is the difference between a worm and a more common computer virus?

  43. What should a system administrator be concerned about updating on regular basis, besides anti-virus software?

  44. What are the two kinds of network firewalls, with regard to established connections between devices? Which one would be considered to be the more secure?

  45. What can a system administrator buy and install that would improve the electrical current delivered to computer systems?

  46. Why are computer rooms typically kept colder than other rooms in a workplace?

  47. What are some reasons for having raised floors in a data center?

  48. What is the reason the use of Halon systems is now restricted? Can they be used at all?

  49. What is the reason for storing backup data at a location other than your regular business location?

  50. What should your alternate locations include besides a copy of a recent data backup?