Preview

mcts server 2008 chapter 5 questions

Satisfactory Essays
Open Document
Open Document
2036 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
mcts server 2008 chapter 5 questions
Chapter 4 notes
Devices that store non volatile info and organize info into individual files: USB memory keys, recordable optical disks, solid state disks (SSD), battery backed RAM, and electromechanical hard disk drives. Common disk interface types : SAS, SATA, IDE, SCSI. These apply limits for how disk hardware connects to the computer. Disk storage: any device capable of storing files for a long period of time. Internal Disk: types (IDE,SATA,SCSI) non removable fixed disks attached to these internal interfaces and provide a suitable location to store operating system files required to start the computer. The firmware built in to the computer is designed to recognized supported internal disk storage and boot from at least one of the installed internal disks. External disks: External interfaces are used to connect removable portable disk storage. Typical external disk interface types include USB, eSATA, SCSI, and FireWire. Is useful for expanding a computers bulk file storage to contain application and user file data. but it is not suitable for operating system files that are essential and must always be present. Virtual Hard disk (VHD): publicly available from Microsoft, All file data stored in a VHD is actually stored in a single file on the file system of a real disk drive. A VHD may contain thousands of individual files from the user’s perspective, but it still only appears as one physical file on the real disk drive. Only windows 7 ultimate and enterprise can natively boot from a (VHD). Logical Drives: appears to windows 7 as one disk drive. Internal, external and VHD can all be logical drives. Multiple physical drives can be grouped together to appear as one drive. 2 reasons for doing this. Can have more combined space than one physical drive can have. And adds fault tolerance that allows for a physical drive to fail without losing access to the logical drive. Redundant array of inexpensive disks (RAID) software used to combine disks into logical

You May Also Find These Documents Helpful

  • Satisfactory Essays

    1. What are the two types of technologies used inside hard drives? SOLID STATE & MAGNETIC…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Which of the following is not a feature of the file system that might be used with a hard disk drive?…

    • 957 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Nt1210 Chapter 1 Review

    • 1315 Words
    • 6 Pages

    8. Which of the following is not a feature of a file system that might be used with a hard disk dirve?…

    • 1315 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    The lab environment consists of computers connected to a local area network. The computers required for this lab are listed in Table 1-1.…

    • 1996 Words
    • 8 Pages
    Satisfactory Essays
  • Powerful Essays

    1. A friend of yours has asked which version of Windows 7 should be purchased to start a new multimedia-based home entertainment system. Your friend will not require business support features, but they will require support communicating with their Xbox 360. You recommend:…

    • 1510 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    I can understand your concern with your network security and better securing your information without losing productivity. You can set up your users to have their passwords be changed at a certain time and I would recommend a short amount of time in-between. And also you can have the passwords be in a certain context or to be made a certain way and make sheer that the security levels are high on them so that a hacker has a harder time to get in to the network. I recommend you use the following format; using capital and lower case letters the first letter of their name, their whole last name and their employee number, ex. “JVentura10415867@Domain*%$.Local” if someone tried to hack the account and all that they knew was the person name and the domain name they could not get in because it is very unlikely that they would know that person employee number and if they do then you have a spy in your company. Can also buy better security items to better your network things like smart card, finger print scanners, retinal scanners, and others. But I only recommend these for really sensitive information and only for certain users in your company. I hope that this has helped you in any way and I wish the best of luck to you.…

    • 327 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    This document MGT 498 Week 4 Discussion Questions 2 shows solution of this task: "Looking back on the organization you used in your rely to discussion question number 4-1, what evaluation process did the organization use in developing their plans? What these evaluations correct for the situation they found themselves in? What controls did they put in place and what other controls should they consider?"…

    • 606 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This document MGT 498 Week 5 Discussion Questions 1 Strategic Management shows solution of this question: "What role do you see for your organization (or one you worked for in the past) and its use of technology? How can technology both help and hurt your organization? What changes may need to be made to the way the organization uses technology?"…

    • 622 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It 240 Appendix F

    • 301 Words
    • 2 Pages

    |ROM |ROM is short for Read Only Memory and is memory that cannot be modified in any |…

    • 301 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    d. Choose one of the variables in your dataset and classify it according to the levels of measurement. Explain how you know.…

    • 343 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4639 Words
    • 19 Pages

    Computers store data ondisks using files, which are structured in specific ways in order to allow for faster access, higher reliability, and to make better use out of the drive's available space. The specific way in which files are stored on a disk is called a file system, and enables files to have names and attributes. It also allows them to be stored in a hierarchy of directories or folders arranged in a directory tree.…

    • 4639 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    The file MGT 330 Week 4 Discussion Questions 1 has solution on this task: "Tell us about the leader in your organization that you have identified. How well does this leader fit in the organizational structure you have identified. Comment on the posts of your peers."…

    • 474 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Uitm - Mgt153 (Chapter 5)

    • 530 Words
    • 3 Pages

    Definition : the process of administering and coordinating resources effectively, and in an effort to achieve the goals of the organization.…

    • 530 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    E-Business Technology

    • 690 Words
    • 3 Pages

    20. A flash memory data storage device integrated with a USB interface. A. USB Flash Drive…

    • 690 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Form B Course Plan 1

    • 1468 Words
    • 13 Pages

    2. Stair, R.M. and Reynolds, G.W. 2011. Information Systems, International Edition, 10th edition, Course Technology…

    • 1468 Words
    • 13 Pages
    Satisfactory Essays