Preview

70-643 Lesson 2

Good Essays
Open Document
Open Document
579 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
70-643 Lesson 2
70-643 Lesson 2

Key Terms

ACEs - an entry in an objects acl that grants permissions toa user or group
ACL - A collection of access control entries that defines the access that all users and groups have to an object
ATA - A disk interface that uses parallel communications to connect multiple hard drives to a computer
Authorization - The process of making sure someone is who they say they are
Basic Disk - The default disk type, it can have up to four partitions, three primary and one extended
Direct-attached Storage - a computer whith hard drives stored in it
Disk Duplexing - Method of fault tolerance, duplicate data is stored on two disks in seperate host adapters
Disk Mirroring - Method of fault tolerance, duplicate data is stored on two seperate disks
DiskPart.exe - Command line method to do all your disk related deeds
Dynamic Disk - Alternative to basic disk, able to have an unlimited number of volumes
Effective permissions - A combination of all the permissions from various sources
External Drive Array - Hard disks attached to a computer through a network medium
File System - A part of the OS for storing and organizing files
Folder redirection - A useful feature that lets users save thier files to a network location
LUNs - An identifier assigned to a specific component within a SCSI device which enables the SCSI host adapter to send commands to that component.
NAS - A dedicated file server that is connected to a network and provides users with file based storage
Offline Files - Lets people keep copies of files on their machines so that if the server goes down they can still work
Partition Style - The ways disks are organized in windows
RAID - Multiple disks working together as pals to do great things such as fault tolerance or increases to read/write speeds
SID - Every active directory object gets one of these, kinda like a social security number
Security Principal - Whoever is an administrator assigns permissions to
SATA - Newer

You May Also Find These Documents Helpful

  • Satisfactory Essays

    1. What are the two types of technologies used inside hard drives? SOLID STATE & MAGNETIC…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT 1230 CLIENT

    • 374 Words
    • 2 Pages

    d. RAID 6: a combination of RAID levels that utilize multiple RAID 5 sets striped in a single array. A single hard drive failure can occur in each of the RAID 5 sides without any loss of data on the entire array. If more than one disk in any of the RAID 5 arrays all the data in the array is lost.…

    • 374 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It109 Final Review Paper

    • 792 Words
    • 4 Pages

    A dynamic disk is able to contain an unlimited number of volumes that function like a primary partitions on a basic disk.…

    • 792 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Ittnt2670 Lesson 1

    • 489 Words
    • 2 Pages

    The feature that enhances fault tolerance by providing multiple data paths to a single server storage device is called _________.…

    • 489 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 3 Quiz

    • 2246 Words
    • 9 Pages

    10) Which of the following is a technology used to place content on a shared file server in a company?…

    • 2246 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    An ACL is a Control list which will allow or deny traffic or devices based on specifications defined in the ACL. This ACL generally is applied and configured on Firewalls. It is useful in a layered security approach because from an External standpoint it become the first line of defense when hosts attempt to connect to the network.…

    • 928 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Disk Redundancy

    • 709 Words
    • 3 Pages

    e. RAID Level 4 stripes data at a block level across several drives, with parity stored on one drive. The parity information allows recovery from the failure of any single drive. The performance of a level 4 array is very good for reads (the same as level 0). Writes, however,…

    • 709 Words
    • 3 Pages
    Good Essays
  • Good Essays

    customer service

    • 5351 Words
    • 19 Pages

    Offers and provides companies and individuals with a free online storage service via one drive and also a internet calling and messaging service.…

    • 5351 Words
    • 19 Pages
    Good Essays
  • Good Essays

    | b. direct access See also sequential access to place (information) in a storage device…

    • 799 Words
    • 4 Pages
    Good Essays
  • Good Essays

    A storage area network can use existing communication technology optical fiber or it may use the newer Fibre Channel technology. Some SAN system integrators liken it to the common storage bus (flow of data) in a personal computer that is shared by different kinds of storage devices such as a hard disk or a CD-ROM player. SANs support disk mirroring, backup and restore, archival and retrieval of archived data, data migration from one storage device to another, and the sharing of data among different servers in a network.…

    • 632 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cyber Crime Law

    • 895 Words
    • 4 Pages

    (1) Illegal Access. – The access to the whole or any part of a computer system without right.…

    • 895 Words
    • 4 Pages
    Good Essays
  • Good Essays

    raid

    • 770 Words
    • 4 Pages

    RAID is a data storage technology that combines multiple disk drive components into a logical unit for the purposes of data redundancy and performance improvement.[1] Data is distributed across the drives in one of several ways, referred to as RAID levels, depending on the specific level of redundancy and performance required.…

    • 770 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Network File Sharing

    • 460 Words
    • 2 Pages

    Storing files in a central server allows only clients with permissions for the files to access them. Furthermore, files can be encrypted to protect the information without the proper password and user rights access. File sharing is better than using an external device since, external devices can be lost, or stolen. Sharing a file through a network allows the encryption to protect the permissions of the file and the access to the file.…

    • 460 Words
    • 2 Pages
    Good Essays
  • Better Essays

    power supply failure

    • 1581 Words
    • 7 Pages

    RAID is now used as an umbrella term for computer data storage schemes that can divide and replicate data among multiple physical drives: RAID is an example of storage virtualization and the array can be accessed by the operating system as one single drive.…

    • 1581 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    SCSI: Stands for "Small Computer System Interface," and is pronounced "scuzzy." SCSI is a computer interface used primarily for high-speed hard drives. This is because SCSI can support faster data transfer rates than the commonly used IDE storage interface. SCSI also supports daisy-chaining devices, which means several SCSI hard drives can be connected to single a SCSI interface, with little to no decrease in performance.…

    • 636 Words
    • 3 Pages
    Satisfactory Essays