Preview

Lesson 2

Good Essays
Open Document
Open Document
959 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lesson 2
Lesson 2
Deploying a File Server
Knowledge Assessment
Fill in the Blank
Complete the following sentences by writing the correct word or words in the blanks provided. 1. The feature that enables a Windows Server 2008 computer to maintain up to 64 previous versions of a file is called shadow copies.

2. The process of granting users access to file server shares by reading their permissions is called authorization. 3. In Windows, the fat32 file system is limited to volumes no larger than 32 GB.

4. The drive interface that is preferred for network servers is called SCSI.

5. A mirrored drive installation that also uses redundant host adapters is called disk duplexing.

6. The combination of permissions assigned to a file, plus the permissions inherited from parent folders and group memberships, is called the file’s effective permissions.

7. The diskpart utility enables you to create a fourth primary partition on a basic disk.

8. The disk interface most commonly associated with workstations is called ATA.

9. What type of volumes use parity information to rebuild data in the event of a disk failure? Raid-5

10. In the NTFS permission system, standard permissions are actually combinations of special permissions.

Multiple Choice
Select the correct answer for each of the following questions. Choose all answers that are correct. 1. Which of the following statements are true of striped volumes? a. Striped volumes provide enhanced performance over simple volumes. b. Striped volumes provide greater fault tolerance than simple volumes. c. You can extend striped volumes after creation. d. If a single physical disk in the striped volume fails, all of the data in the entire volume is lost. 2. Which of the following statements are true of simple volumes? a. You create simple volumes from a single disk. b. You can extend a simple volume to multiple disks to create a spanned or a striped

You May Also Find These Documents Helpful

  • Powerful Essays

    NT1430 Lab2 Joy Brewer

    • 989 Words
    • 4 Pages

    9. What does the command chmod do? lets you change permissions of a file What happens when I use it with the following?…

    • 989 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    8.) Striped Volume Disk striping is used with redundant array of independent disks (RAID). RAID is a storage system that uses multiple disks to store and distribute data. Up to 32 hard disks can be used with disk striping.…

    • 2058 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    NT1430 Chapter 6 labs

    • 297 Words
    • 3 Pages

    1. Determine the permissions of various files and directories on the system. Fill in the chart below:…

    • 297 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    NT1110Module4 SA

    • 302 Words
    • 1 Page

    Windows requires a file system to operate. There are different types of file systems that were made to use with Windows. The first one is File Allocation Table and it has three versions. The latest version is FAT32. The second one is New Technology File System. It is the standard for every operating system.…

    • 302 Words
    • 1 Page
    Good Essays
  • Good Essays

    7. Create a new folder in the Documents folder, and mount the new volume in the folder…

    • 250 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    3. If you can browse a file on a Windows network share, but are not able to copy it or modify it,…

    • 518 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    RAID50 is fairly stable if set up correctly, RAID 10 is thought to be one of the best set ups for fault tolerance since more drives can fail at once without data loss.…

    • 315 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    9 Which of the following is a feature provided by Medisoft to assist in maintaining data files stored in a system?…

    • 484 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Chap 2

    • 1409 Words
    • 5 Pages

    The majority of permissions in a Windows environment are controlled at the user group level.…

    • 1409 Words
    • 5 Pages
    Good Essays
  • Good Essays

    File Management

    • 775 Words
    • 4 Pages

    Protection of files needs to be set up so that there is access given to users on a system in three different permission categories. The first is the permission to read a file. The second is the permission to write or make changes to a file. The final is the permission to run or execute a file. A UNIX system sets up three classifications for its users; an owner or user, a group, and the other. First is the owner, which is the creator of a file, or the user at a specific time of a file. A group is a class to which the user or owner belongs. A group could be a department of a company or any other type of grouping with specific members. Last, the other is the general World Wide Web audience (“Unix Protection and Permissions”, n.d.).…

    • 775 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Storage and File Organization ECS-165A WQ’11 111 Classification of Physical Storage Media • Main criteria: Speed with which data can be accessed and cost per unit of data to buy medium • Reliability – data loss on power failure or system crash – physical failure of the storage device • Classification: – volatile storage: loses contents when power is turned off – non-volatile storage: contents persist when power is switched off Physical Storage Media • Cache: fastest and most costly form of storage; volatile; managed by the hardware and/or operating system • Main Memory: – general purpose instructions operate on data in main memory – fast access but in general too small to store the entire database (or even an entire relation) – volatile – content of main memory is usually lost if a power failure or system crash occurs Dept. of Computer Science UC Davis 6. Storage and File Organization ECS-165A WQ’11 112 • Magnetic-Disk Storage: primary medium for the long term storage of data; typically stores the entire database (i.e., all relations and associated access structures) – data must be moved from disk to main memory for access and written back for storage (insert, update, delete, select) – direct-access, i.e., it is possible to read data on disk in any order – usually survives power failures and system crashes; disk failure, however, can destroy data, but is much less frequent than system crashes • Optical Storage: non volatile; CD-ROM/DVD most popular form; Write-Once-Read-Many (WORM) optical disks are typically used for archival storage. • Tape Storage: non-volatile, used…

    • 2025 Words
    • 14 Pages
    Good Essays
  • Satisfactory Essays

    Storage Management

    • 430 Words
    • 2 Pages

    RAID 0 is data striping. This means that data will appear to a user as one logical disk but all the data is distributed among two physical disks. If one disk fails operation cannot continue and data is lost because it is only stored in one place.…

    • 430 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Partitioning

    • 1021 Words
    • 5 Pages

    Size the partition in megabytes using the Simple Volume Size field and then click Next. 5. On the Assign Drive Letter Or Path page, specify whether you want to assign a drive letter or path and then click Next. The available options are as follows: Assign The Following Drive Letter Select an available drive letter in the selection list provided.…

    • 1021 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    It is a common knowledge that a different storage option must be opted for while saving the data being recovered.…

    • 1675 Words
    • 7 Pages
    Good Essays
  • Good Essays

    operating system

    • 654 Words
    • 3 Pages

    The user can apply various operations on such files like add, modify, delete or even remove the entire file.…

    • 654 Words
    • 3 Pages
    Good Essays