exam 4 chapter 11 Flashcards

1
Q

provides a convenient interface for users and applications to access computer hardware components

A

An operating system (OS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is the method by which an OS stores, organizes, and manages access to files on a storage device (such as a hard drive)

A

A file system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

File systems have the following objectives

A

Provide a convenient interface for users and applications to open and save files
Provide an efficient method to organize space on a drive
Provide a hierarchical filing method to store files
Provide an indexing system for fast retrieval of files
Provide secure access to files for authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

interacts with the file system

A

The user interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

on a disk drive is divided into sectors

A

Storage space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Storage space

A

Sectors are grouped to make a cluster (or block)
A Cluster is the smallest amount of space that can be occupied by a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A disk’s cluster size is selected when the disk

A

is formatted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If you know that that you’re going to store many files under 2K bytes, choose

A

a smaller cluster size when you format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The formatting process groups sectors into

A

clusters and maps all disk clusters for fast access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Most file systems organize files in a hierarchy of

A

folders or directories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Top of the hierarchy is called the

A

“root”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The root often represents a

A

disk drive or other mass storage drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Most file systems include an indexing system that enables users to search for a

A

file based on all or part of a filename

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

maintains a database that’s updated as files are created

A

The indexing system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

controls (permissions) can be used to allow only authorized users to access certain files or folder

A

A file system’s access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

can be used to secure OS files from accidental corruption or deletion

A

Access controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Most current OSs include access controls except

A

Older DOS and Windows FAT16 and FAT 32 don’t support file and folder permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

is a program that is loaded into memory and run by the CPU

A

A process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Can be an application or a program that communicates with and provides services to other processes (called a “service” in Windows and a “daemon” in Linux)

A

a process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

allow your computer and applications to perform tasks they otherwise couldn’t

A

Network services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

An OS can run many processes at the same time by using

A

multitasking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A computer multitasks by using a method called

A

time slicing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

occurs when a CPU’s computing cycles are divided between more than one process

A

time slicing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Two types of multitasking

A

Preemptive and cooperative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

preemptive

A

OS controls which process gets access to the CPU and for how long

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

OS can’t stop a process, a process maintains control until it satisfies its computing needs

A

Cooperative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Many applications are now designed so that different parts can be scheduled to run separately
Each part that can be scheduled to run is called

A

a thread

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

a thread

A

(the smallest unit of software scheduled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

has two or more threads that can be scheduled separately for execution by the CPU

A

multithreaded application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

allows performing multiple tasks or threads simultaneously, each by a different CPU or CPU core

A

Multiprocessing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

the kernel

A

Schedules process to run
Making sure high-priority processes are taken care of first
Manages memory to ensure that two applications don’t attempt to use the same memory space
Makes sure I/O devices are accessed by only one process at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

is usually shown as the layer just above the hardware

A

The kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Client OSs usually come with client software, such as

A

Web browsers, DNS and DHCP clients, and file-sharing clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

The main purpose of the client OS is to run applications

A

Which often access network resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Most desktop computers have the following network client software

A

DHCP client
DNS client
HTTP client (Web browser)
File-sharing client
E-mail client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

client allows the computer to access files and printers on the network

A

A file-sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

intercepts the request and examines it to determine whether the resource is local (on the computer) or remote (on the network)

A

A redirector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

With redirectors, network resources can be

A

accessed as though they were local

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

shared network folders are accessed just like a drive that is physically attached to the system

A

with drive mapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

In Windows, the two most common ways to access a shared resource are using the

A

UNC path or mapping a drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

UNC example:

A

\server-name\sharename\subfolder\file.extension

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Using the net command example

A

Net use drive-letter:\server-name\sharename

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

The protocol used in Windows to share files and printers is

A

SMB, also known as Common Internet File System (CIFS)

44
Q

also supports SMB implemented as an installation option called Samba

A

Linux

45
Q

The native file-sharing protocol in the Linux environment is

A

Network File System (NFS)

46
Q

The most common e-mail protocols

A

Post Office Protocol version 3 (POP3) , Simple Mail Transport Protocol (SMTP) , Internet Message Access Protocol (IMAP)

47
Q

used to download incoming messages from an e-mail server to local desktops

A

POP3

48
Q

standard protocol for sending Internet and other TCP/IP based email

A

Simple Mail Transport Protocol (SMTP)

49
Q

has advanced message controls, including the capability to manage messages locally yet store them on a server

A

Internet Message Access Protocol (IMAP)

50
Q

in an OS: Memory, CPU, and disk usage on client OSs is

A

optimized to run user applications and client network software

51
Q

Most server OSs in a typical network provide:

A

Centralized user account and computer management
Centralized storage
Infrastructure services, such as name resolution and address assignment
Server and network fault tolerance

52
Q

A server-based network is centralized management of network resources, which includes the following functions

A

User authentication and authorization
Account management
Security policy management

53
Q

is the process of identifying who has access to the network
Most common form is a logon with a username and password
Other forms include digital certificates, smart cards, and biometric scanners

A

Authentication

54
Q

is the process of granting or denying an authenticated user’s access to network resources

A

Authorization

55
Q

The server version of Windows OSs includes a

A

centralized account management, authentication, and authorization system called Active Directory

56
Q

When Active Directory is installed on a server

A

the server becomes a domain controller and users and computer with accounts are referred to as domain members

57
Q

Accounts in Active Directory are used to distribute and enforce policies for network use and security
These policies are called

A

group policies

58
Q

Network Information Service (NIS)

supports both Windows and Linux user authentication and authorization

A

Linux OSs have a basic directory service called
Lightweight Directory Access Protocol (LDAP) supports both Windows and Linux user authentication and authorization

59
Q

Network storage includes

A

File sharing
Storing e-mail, user files, application databases, data backups and more

60
Q

Many network administrators are using specialized devices to help manage their storage

A

Network-attached storage devices
Storage area networks
Cloud-based storage

61
Q

device is a dedicated server designed solely for providing shared storage for network users

A

network-attached storage (NAS)

62
Q

technology allows multiple servers to access a large amount of storage that appears as locally attached drives

A

Storage Area Network (SAN)

63
Q

some or all of an organization’s data is stored on servers located offsite and maintained by a storage hosting company

A

Cloud-Based Storage

64
Q

can be removed, replaced, or added to a server while it is running

A

Support for hot-swappable devices

65
Q

Two or more servers configured to operate as a single unit

A

Server clustering

66
Q

if one server fails, the other takes over

A

Failover cluster

67
Q

spreading the workload among multiple computers

A

Load-balancing cluster

68
Q

disk controllers capable of a disk arrangement know as redundant array of independent disks (RAID) where if one disk fails, the data is preserved and the server can continue to operate

A

Redundant/high-end disk systems

69
Q

Most server OSs support virtual private networks (VPNs) and older dial-up method of remote access

A

Remote Access

70
Q

Server OSs support advanced database systems such as MySQL, SQL Server, and Oracle

A

Database server

71
Q

Corporate email systems and web-based application are examples

A

Client/server applications

72
Q

allows multiple OSs to run on the same physical computer at the same time

A

Virtualization

73
Q

a process that creates a software environment to emulate a computer’s hardware and BIOS

A

Virtualization

74
Q

is the virtual environment that emulates a physical computer’s hardware and BIOS

A

Virtual machine

75
Q

the operating system installed on a VM

A

Guest OS

76
Q

the physical computer on which the VM software is installed

A

Host Computer

77
Q

creates and manages VMs and creates the virtual environment in which a guest OS is installed

A

Virtualization software

78
Q

creates and monitors the virtual hardware environment, which allows multiple VMs to share physical hardware resources

A

Hypervisor

79
Q

runs directly on the host computer’s hardware and controls and monitors guest OSs (also called bare-metal virtualization)

A

Type 1 hypervisor

80
Q

is installed in a general-purpose host OS and the host OS access host hardware on behalf of the guest OS (also called hosted virtualization)

A

Type 2 hypervisor

81
Q

consists of files residing on the host computer that represent a virtual machine’s hard drive

A

A virtual disk

82
Q

is a network configuration created by virtualization

A

A virtual network

83
Q

is a partial copy of a VM made at a particular moment

A

A snapshot

84
Q

Only hardware requirement is enough memory to support the host and guest OSs, adequate CPU power, and enough space to store the virtual disk

A

type 2 hypervisor

85
Q

Has an advantage of supporting a wider variety of guest OSs because there are few incompatibility problems between the guest OS and hardware

A

type 2 hypervisor

86
Q

Hosted Virtualization Applications

A

OS Training
Software Training
Application isolation
Network isolation
Software development
What-if-scenarios
Use of legacy applications
Physical-to-virtual conversion

87
Q

After installed, a wizard takes you through the steps of creating a virtual machine

A

Using VMware Workstation

88
Q

flexible networking options allowing you to configure the NIC on your VM to use of the three virtual network options or you can create your own custom virtual network

A

VMware Workstation

89
Q

Three preconfigured options:

A

Bridged
NAT
Host-only

90
Q

stripped down version of VMware that offers the basics of desktop virtualization

A

Using VMware player

91
Q

Includes an option to download a virtual appliance, which is a ready-to-use VM that contains a guest OS with preconfigured applications or network services
A good option for new virtualization users and for classroom and training centers

A

VMware player

92
Q

runs only in Windows 7 Professional, Enterprise, or Ultimate

A

Using Microsoft Virtual PC

93
Q

it can be installed on Windows, Mac OS X, Linux, and Solaris hosts and supports a wide range of Windows, Linux, and other guest OSs

A

using VirtualBox

94
Q

The user interface consists of a console where you can create VMs and view the status of all VMs

A

VirtualBox

95
Q

Targeted mainly for production virtualization in data centers
Installed directly on hardware and have more stringent host machine requirements
Offer more features for managing VMs than hosted virtualization
A little more complicated to install and use as well

A

Type 1 hypervisor

96
Q

Retire old or unreliable hardware: converting physical machines to VMs
Maintain application separation

A

Consolidate servers

97
Q

Bare-Metal Virtualization Applications

A

Test installation and upgrades
Test a preconfigured application
Test what-if scenarios
Live migration
Dynamic provisioning

98
Q

introduced with Windows Server 2008 and can be installed as a server role

A

Microsoft Hyper-V

99
Q

Uses Linux as a management OS on the host

A

Citrix XenServer

100
Q

includes VMware ESX Server, which is installed directly on the physical server without a management OS

A

VMware vSphere

101
Q

Minimum requirement is a 1.4 GHz CPU

A

CPU architecture

102
Q

SAS vs. SATA

A

Disk subsystem

103
Q

Minimum requirement is 512 MB RAM

A

memory

104
Q

suitable for businesses managing huge amounts of data, using virtualization on a large scale, running high-end applications

A

Datacenter Edition

105
Q

suitable for most small to medium businesses

A

Standard Edition

106
Q

aimed at small businesses with 25 or fewer users

A

Essentials Edition

107
Q

entry-level edition, suitable for small businesses that need to purchase a complete server solution

A

Foundation Edition