This website uses cookies to ensure you have the best experience. Learn more

Disk Redundancy Essay

643 words - 3 pages

Lesson 5
Connecting to a Network
Knowledge Assessment
Fill in the Blank
Complete the following sentences by writing the correct word or words in the blanks provided.
1. A software routine, which also acts as a filter that blocks certain type of incoming and outgoing traffic, while enabling other types is called a __________________.
Firewall P. 163
2. The __________________ tool provides a central access point for all of the network controls and connections on a computer running Windows 7.
Network and Sharing Center P. 162
3. A device that connects one network to another is called a __________________.
Router P. 149
4. The most common method for illustrating the operations of a networking stack is the __________________, which consists of __________________ layers.
Open Systems Interconnection (OSI) reference model, seven P. 160
5. Protocols that do not guarantee delivery of their data, but do operate with a very low overhead that conserve network bandwidth are called ...view middle of the document...

The Windows 7 utility that displays a list of the routers currently forwarding packets to a particular destination is called __________________.
Tracert.exe P. 177
10. The top and bottom layers of the OSI model are called the __________________ and ________________ layers.
application and physical P. 160
True / False
1. The purpose of Network Diagnostics is to display error messages only.
False. Network Diagnostics does not display error messages only; it tells you in clear language what might be wrong and what you have to do to repair the problem.
2. Transport layer protocols are not concerned with addressing packets to the correct system.
True.
3. The Network Map utility uses a new protocol called Link Layer Topology Discovery (LLTD) to discover information about the network and the devices attached to it.
True.
4. The protocols that Windows uses by default at the network and transport layers are collectively called TCP/IP.
True.
5. Home and work computers have Network Discovery turned on, and public computers have it turned off.
True
6. There are two basic types of port numbers: ephemeral port numbers and well-known port numbers. True.
7. A Windows 7 computer that is connected to a LAN has a hardware address and a computer that is connected to the Internet has an IP address.
False. LAN and Internet computers have both hardware addresses and IP addresses.
8. The only two layers of the OSI reference model that do not have individual protocols associated with them are the transport layer and the session layer.
False. The two layers of the OSI reference model that do not have individual protocols associated with them are the session layer and the presentation layer.
9. Because the configuration of the Internet is constantly changing, the only way you can know for certain what route packets are taking to a specific destination is to use Tracert.exe.
False. Because the configuration of the Internet is constantly changing, there is no guarantee that the route displayed by Tracert.exe is completely accurate. Each time the path could be different.
10. The IPv6 addresses Windows 7 computers use at the network layer are six-byte hexadecimal sequences, hard coded into each network interface adapter by the manufacturer.
False. IPv6 addresses are 128 bits (16 bytes) long and are usually automatically assigned by the TCP/IP client.

Other Papers Like Disk Redundancy

Re: Lesson 06 Discussion Question Essay

2837 words - 12 pages (RAID) – Computer configuration involving two or more disks – Originally developed as a data-redundancy measure • RAID 0 – Provides rapid access and increased storage – Lack of redundancy • RAID 1 – Designed for data recovery – More expensive than RAID 0 Guide to Computer Forensics and Investigations 37 Understanding RAID (continued) • RAID 2 – – – – Similar to RAID 1 Data is written to a disk on a bit level Has better data

Nt1230Unit2Diskredundancyresearch Essay

728 words - 3 pages NT1230 1/1/16 Unit 2 Assignment 1 Disk Redundancy Research RAID stands for redundant array of independent disks and is a data storage virtualization technology that combines multiple physical drives into a single logical unit for the purpose of backing up vital data, improving system performance, or both. It’s most useful for businesses because they usually network terminals that all pull from a central server with everything stored on it

Salmagundi Quiz

652 words - 3 pages redundancy Backups Break mirror Install new disk and reestablish RAID Install new disk and reestablish RAID Install new disk and reestablish RAID Name & Connector type 10Base5 Vampire Taps Cable Type Coaxial Coaxial UTP UTP UTP UTP UTP & STP Fiber Fiber Copper Fiber Cat5 UTP Multimode fiber Multimode fiber Max. Speed 10Mbps 10Mbps 10Mbps 100Mbps 100Mbps 100Mbps 100Mbps 10Mbps 100Mbps 1000Mbps 1000Mbps 1000Mbps 1000Mbps 100Mbps Max

Study Guide To Accompany Operating Systems Concepts 8th Ed By Silberschatz, Galvin And Gagne By  Andrew  Denicola,  Bu  Ece  Class  Of  2012  

5185 words - 21 pages of cylinders, each treated as logical disk Logical formatting: “making a file system” Increase efficiency by grouping blocks into clusters - Disk I/O is performed on blocks ◦ Boot block initializes system - bootstrap loader stored in boot block Swap-space: virtual memory uses disk space as an extension of main memory ◦ Kernel uses swap maps to track swap space use RAID: Multiple disk drives provide reliability via redundancy – increases

Disaster Plan

1306 words - 6 pages Company’s Internet use and networking needs, it is recommended that the Company invests in dual redundant firewalls made by Cisco. The implementation of dual Cisco ASA firewalls in a failover configuration would provide the Company with redundancy in the event that a single firewall fails. In addition to security the internal network from the Internet, it is recommended that the Company invests in Cisco 4507 network switches for its network

C White Data Communication, Chapter 8 Quiz

3578 words - 15 pages more common RAID techniques include: * RAID-0, in which the data is broken into pieces, and each piece is stored on different disk drives. This technique is known as striping. There is no redundancy of data in this technique, so if one disk drive fails, some of the data is lost. The advantage of this technique, however, is the speed at which data can be read or written across multiple disks at the same time. * RAID-1, in which the data is stored

Research Proposal Final

1681 words - 7 pages ...................................................................................... . 6 Figure 3. Rack Layout Re sulting Powe r Demands............................................................................ 7 Figure 4. Use Rack Unit — The Primary Pl anning Fa ctor................................................................. 8 Figure 5. Design Criter ia: Scope and Redundancy

Computer Terms

900 words - 4 pages Flash Memory, and SSDs (my absolute favorite). Remember to be redundant; don’t learn about redundancy the hard way… ( I/O Device: Technically speaking, any device that can both give and receive data from/to a computer. A cd/dvd/blu-ray-burner drive is an I/O device because you can write to it, and obtain data from it. A mouse is an input device only; you can only give the computer coordinates to where to move the pointer. A flash drive

Information System

1842 words - 8 pages . What-if analysis c. Goal-seeking analysis d. All of the above 8. Information can be saved in many ways with a computer, the main memory is called: a. Central Processing Unit b. Primary Storage c. Secondary Storage d. Optical Disks 9. A large capacity disk typically found in computers for storage is known as: a. Optical Disk b. Floppy Disk c. Hard Disk d. Central Processing Unit 10. What is the ultimate goal of AI: a. Perform

Cloud Computing

1414 words - 6 pages cloud acts as a common center for its users to fulfill their computing needs. Cloud Computing
Cloud Computing makes computer infrastructure and services available "on-need" basis. The computing infrastructure could include hard disk, development platform, and database computing power or complete software applications. To access these resources from the cloud vendors, organizations do not need to make any large-scale capital expenditures. Pay

Stuxnet Virus

1219 words - 5 pages , someone had unleashed the destructive Stuxnet worm; it was buried in the disk space of Natanz’s computers with just one aim — to sabotage the country’s uranium enrichment program and prevent President Mahmoud Ahmadinejad from creating a nuclear weapon (Zetter, 2011). Natanz is a nuclear facility where gas centrifuges spin like whirling dervishes, separating bomb-grade uranium-235 isotopes from the more plentiful U-238 (Clarke, 2012). Stuxnet seized

Related Essays

Disk Redundancy Research Essay

829 words - 4 pages Disk Redundancy Research 1) RAID stands for redundant array of independent disks, originally redundant array of inexpensive disks. 2) It is a good idea to use RAID to enhance performance and storage. 3) A) RAID 0 - block-level striping without parity or mirroring B) RAID 1 - mirroring without parity or striping C) RAID 5 - block-level striping with distributed parity D) RAID 6 - block-level striping with double distributed parity 4) It is

Nt1230 Lab Essay

528 words - 3 pages Administrators group. 9. The default partition style used by Windows 7 on an x86 computer is MBR. 10. All digitally signed drivers have undergone Windows Hardware Quality Labs testing. UNIT 2 ASSIGMENT 1: Disk redundancy research 1. RAID stands for Redundant Array of Inexpensive (or Independent) Disks. 2. When you need to take the time to restore those backups and those backups could be hours or days old, resulting in data loss

Xyz Disaster Plan Essay

1350 words - 6 pages are used on servers. The RAID system can also be made useful on workstations. This will allow for increased storage functions and reliability through redundancy. RAID schemes divide and duplicates between several disk drives. Each scheme sustains a different balance between two goals; increase data reliability and input/output performance. Some of the schemes continue operating even when part of the system fails. For the most part, they will

Network Security Administration Essay

823 words - 4 pages Unit 2. Assignment 1. Disk Redundancy Research 1. What does RAID stand for? RAID (originally redundant array of inexpensive disks, now commonly redundant array of independent disks) (unknown, 2015) 2. When would we use RAID? You would use RAID when you have a lot of important data that you are constantly changing and need to back up often. 3. Define the following types of RAID. a. RAID 0 RAID 0 consists of striping, without mirroring or