Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Chapter 11 TRUE/FALSE 1)The organization of the file system on a server has no impact on network performance or security

Chapter 11 TRUE/FALSE 1)The organization of the file system on a server has no impact on network performance or security

Computer Science

Chapter 11

TRUE/FALSE

1)The organization of the file system on a server has no impact on network performance or security.

 

 

     2.   Deleting temporary files on a Windows system is not necessary because Windows doesn’t create temporary files.

 

 

     3.   Disk fragmentation causes reduced disk performance because the disk read/write heads must move longer distances.

 

 

     4.   A differential backup backs up files that have the archive attribute set but does not reset the archive attribute.

 

 

     5.   Virtual memory is a storage area in a computer’s RAM that is set aside for the page file.

 

 

MULTIPLE CHOICE

 

     1.   Which of the following is NOT a good rule to follow when creating a file structure?

a.

keep a manageable number of directories in the root

c.

keep different versions of software in their own directories

b.

create a folder for deleted files to be stored temporarily

d.

group files with similar security needs

 

 

 

     2.   You have used Windows Performance monitor and you are trying to locate the files created by this application.  What is the name of the folder where Windows store the results of Windows performance tests?

a.

Logs

c.

PerfLogs

b.

MonLogs

d.

TempLogs

 

 

 

     3.   Which of the following is a database of information about the Windows operating system including customized settings and software installations?

a.

registry

c.

changelog

b.

performance monitor

d.

\windows\system32

 

 

 

     4.   Which of the following is a file extension that indicates the file type of application in a Windows environment?

a.

ocx

c.

ini

b.

app

d.

exe

 

 

 

     5.   Which of the following values is the recommended maximum percentage of disk space you should use for best reliability?

a.

50

c.

95

b.

20

d.

80

 

 

 

     6.   Which of the following commands should you use to delete files on a Linux system?

a.

mv

c.

delete

b.

rm

d.

expunge

 

 

 

     7.   Which command should you use on a Linux system to find and print a list of files that begin with acctg that have been modified in the last 10 days?

a.

find -name acctg* -mtime -10 -print

c.

find -name *acctg -mod 10 -print

b.

search -name acctg* -mod 10 -print

d.

search -name *acctg -mtime 10 -print

 

 

 

     8.   You manage a server that users store their document files on.  You are finding that some users are utilizing more space than they should with some very large files.  What can you do to prevent users from taking up too much space on the server?

a.

set stricter share permissions

c.

set up disk quotas

b.

send a memo telling users to start storing files on their local computer

d.

delete files that are larger than 500 MB in size.

 

 

 

     9.   If you analyze your disk and find that most of the files are stored contiguously on the disk, what should you do?

a.

run a disk fragmenting utility

c.

implement disk repositioning

b.

run a disk defragmenting utility

d.

nothing

 

 

 

   10.   You find that disk operations on your server have gradually gotten slower.  You look at the hard disk light and it seems to be almost constantly active and the disk seems noisier than when you first installed the system.   What is the likely problem?

a.

the disk spindles need to be greased

c.

there are bad sectors on the disk

b.

the disk is fragmented

d.

you have not implemented quotas

 

 

 

   11.   Which of the following is a method to defragment a hard disk?

a.

backup the disk and do a full restore

c.

restart the computer in the BIOS and reset the BIOS to system defaults

b.

copy the files to a server, reboot, and copy the files back to the disk

d.

delete all your applications and then re-install them

 

 

 

   12.   If your Mac OS system displays a message indicating it is low on memory, which of the following is NOT a remedy to this memory fragmentation problem?

a.

implement virtual memory

c.

plug in a USB flash drive

b.

close all open applications

d.

restart the computer

 

 

 

   13.   Which command should you run on a Windows system to check for and fix problems with the file system?

a.

fsck

c.

chkdsk

b.

p_fsck

d.

dskrep

 

 

 

   14.   Which of the following is NOT an argument for using RAID?

a.

increased speed

c.

increased storage capacity

b.

decreased costs

d.

increased reliability

 

 

 

   15.   Which of the following RAID configurations uses disk striping and includes the ability to replace a failed drive and rebuild the RAID without shutting down the server?

a.

RAID 0

c.

RAID 1

b.

RAID 4

d.

RAID 5

 

 

 

   16.   Which software RAID levels do Windows server OSs provide?

a.

RAID 0, 2, 5

c.

RAID 0, 1, 5

b.

RAID 1, 3, 5

d.

RAID 3, 4, 5

 

 

 

   17.   Which of the following is a partial backup that backs up files with the archive attribute and then removes the archive attribute on those files?

a.

differential

c.

incremental

b.

sequential

d.

binary

 

 

 

   18.   Which of the following is a true statement about rotating backup media?

a.

it can protect against media failure

c.

media rotation is only necessary with tape drives

b.

you should never have more than one full set of media

d.

media rotation only happens with hard drives since the platters rotate

 

 

 

   19.   Which of the following is a general rule you should consider when configuring a page/swap file?

a.

only systems with less than 1 GB RAM need a page file

c.

Linux systems don’t allow page file configuration

b.

the initial size should be set to 1.5 times the amount of RAM

d.

if the swap file system is more than 50% full, it should be increased in size

 

 

 

   20.   Which of the following is NOT true about using the ping utility?

a.

it determines whether a network connection is working

c.

it provides round trip time statistics

b.

it can determined if two networks can communicate with one another

d.

it cannot work through routers

 

 

 

COMPLETION

 

 

 

     1.   On a UNIX/Linux system, the _________ directory is used to store files to start the OS and perform essential OS tasks.

 

 

 

      2   Files used in Web browsing called __________, can contain specialized information for accessing particular websites.

 

 

 

      3   Disk _______________ slows down access to files due to excessive movement of the read/write heads.

 

 

 

      4   The ____________ attribute tells a backup program if the file needs to be backed up.

 

 

 

MATCHING

 

 

a.

defragmentation

f.

cookie

b.

page file

g.

incremental backup

c.

binary backup

h.

service packs

d.

RAID 1

i.

surface analysis

e.

differential backup

j.

disk striping

 

 

     1.   a backup technique that backs up all files with an archive attribute,

and then removes the attribute after backup

 

     2.   the process of removing empty pockets between files and other

information on a hard disk drive.

 

     3.   a disk diagnostic technique that locates damaged disk areas and marks

them as bad

 

     4.   a disk storage technique that divides portions of each file over all volumes

 

     5.   software “fixes” issued by the vendor to repair software problems

 

     6.   a technique that backs up the entire contents of one or more disk drives in

an image format

 

     7.   an allocated portion of disk storage reserved for use to supplement RAM when the available RAM is exceeded.

 

     8.   a disk storage arrangement that uses two disks that are mirror images of one another

 

     9.   a text-based file used by websites to obtain customized information about a user

 

   10.   a type of backup that backs up all files with an archive attribute, but

does not remove that attribute after backup.

 

       

       

 

SHORT ANSWER

 

     1.   List three rules for creating a file structure.

 

 

 

     2.   What is the primary purpose of the proc directory on a Linux system?

 

 

 

     3.   You suspect a problem with a file that is important to one of your installed applications.  You are running Windows 7 64-bit edition.  You have thoroughly checked the Program Files folder and cannot find the folder that holds this application.  What might be the problem?

 

 

 

     4.   What are two reasons for installing and leaving operating system files in the directories created by the OS instead of hiding them or using other locations?

 

 

 

     5.   Describe the Windows registry.

 

 

 

     6.   What is the purpose of the Disk Cleanup Tool in Windows?

 

 

 

     7.   Briefly describe how disks can become fragmented.

 

 

 

     8.   What is the difference between writing in linear fashion and writing in sequential fashion?

 

 

 

     9.   List three problems that the chkdsk utility can help you solve?

 

 

 

   10.   Describe a typical backup scheme that uses full, and/or incremental or differential backups.

 

 

Option 1

Low Cost Option
Download this past answer in few clicks

3.83 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE