Thursday 26 January 2017

TEST BANK OF SYSTEMS ARCHITECTURE 7TH EDITION BY BURD





IF You Want To Purchase A+ Work Then Click The Link Below  , Instant Download





If You Face Any Problem E- Mail Us At  whisperhills@gmail.com


Chapter 12 File and Secondary Storage Management

1. ​The storage I/O control layer processes service calls from the command layer or application program and issues commands to the storage I/O control layer to interact with hardware.


2. An FMS provides command-layer functions and utility programs for users and system administrators to manage files, directories, and secondary storage devices.


3. Users and applications view secondary storage logically as a collection of files organized in folders and storage volumes.


4. On larger computers such as servers, a volume can span multiple physical secondary storage devices.


5. A typical laptop computer has up to a few hundred storage volumes.


6. The logical view of secondary storage consists of files contained within folders and storage volumes.


7. A laptop computer with Windows but no installed apps supports over a dozen file types.


8. Most FMSs include direct support for only a few file types but enable additional types to be defined and associated with installed apps.


9. A graph folder structure is less flexible than a hierarchical folder structure.


10. Allocation units can be smaller than the unit of data transfer.


11. If the logical record size is less than the physical record size, a single physical record might contain multiple logical records.


12. Low blocking factors, with larger logical records, require fewer buffers to achieve substantial performance improvements.


13. In most FMSs, files are immediately removed from secondary storage when they’re deleted.


14. Access controls are enforced automatically in FMS service routines that access and manipulate files and directories.


15. File migration moves files from cloud storage to local secondary storage devices as they become older and more out-of-date.


16. Disk mirroring provides a high degree of protection against data loss with no performance penalty if it’s implemented in hardware.


17. Storing parity data reduces a disk array’s usable capacity.


18. DAS is inexpensive and efficient for organizations with dozens or hundreds of servers and terabytes of shared data.


19. The storage server in a SAN is a complete general-purpose computer.


20. A key distinction between SAN devices and NAS servers is the type of storage access requests that are serviced.


21. The technologies that support cloud-based storage services are similar to those used to manage the contents of multilevel primary storage caches.


22. ​The technologies that support cloud-based storage services are similar to those used to manage the contents of multilevel primary storage caches.


23. The ____ is the part of the kernel that accesses storage locations and manages data movement between storage devices and memory.


24. The ____ layer is the bridge between logical and physical views of secondary storage.


25. On a desktop or laptop computer, a ____ is usually an entire physical secondary storage device, a partition of the device, or a removable storage device such as a DVD or flash drive.


26. Among other things, ____ type determines naming restrictions, allowable operations, and physical organization.


27. “Out of the box”, and with no installed apps, a typical operating system directly defines/supports ____ of file types.


28. The relationship between file types and the programs or OS utilities that manipulate them is called ____.


29. In a ____, folders can contain other folders, but a folder can’t be contained in more than one parent.


30. The folder that’s currently being accessed is called the ____ folder

31. A ____ is a data structure that records which allocation units are free and which belong to files.


32. When the storage allocation table uses ____ data structures sequential file access is very efficient but random access is much less efficient.


33. A ____ is a collection of data items, or fields, that an application program accesses as a single unit.


34. A ____ is the unit of storage transferred between the device controller and memory in a single operation.


35. Blocking is described by a numeric ratio of logical records to physical records called the ____.


36. A ____ is a temporary holding area for extracting logical records from physical records.


37. In UNIX, the ____ privilege allows a user or process can view a file’s contents.


38. In UNIX, the ____ privilege allows a user or process to alter a file’s contents or delete it altogether.


39. In Windows NTFS, the ____ contains a sequential set of file records, one for each file in the volume.


40. In a process called ____, a file’s original version is archived automatically whenever the file is modified.


41. When a(n) ____ is performed, the FMS copies all files and directories for an entire storage volume.

42. A(n) ____ archives only files that have been modified since the previous incremental or full backup.


43. ____ is a fault-tolerance technique in which all disk write operations are made simultaneously or concurrently to two storage devices.


44. ____ is a disk storage technique that improves performance and fault tolerance.


45. ____ breaks a unit of data into smaller segments and stores these segments on multiple disks.


46. If five disks are used in a RAID 5 array, ____% of the available disk space stores redundant parity information.


47. The most common example of multiple RAID levels layered to combine their best features is ____.


48. ____ describes any architecture in which software running on a CPU accesses secondary storage devices in the same computer.


49. A ____ is a high-speed interconnection between general-purpose servers and a separate storage server.


50. The term ____ describes any architecture with a dedicated storage server attached to a general-purpose network to handle storage access requests from other servers.


51. A limited-purpose server is sometimes called a “____.”


52. The ____________________ layer provides service functions for manipulating files and directories.

53. Via the ____________________ layer, users perform common file management functions, such as copying, moving, and renaming files.

54. A(n) ____________________ contains information about files and other folders.

55. A(n) ____________________ path begins at the current directory’s level and extends downward to a specific file.

56. A(n) ____________________ is the smallest number of secondary storage bytes that can be allocated to a file.

57. A(n) ____________________ contains a single data item within a logical record.

58. Logical record grouping in physical records is called ____________________.

59. If a physical record contains just one logical record, the file is said to be ____________________.

60. The FMS uses ____________________ in primary storage to store data temporarily as it moves between programs and secondary storage devices.

61. A user might be able to recover a deleted file by performing a(n) ____________________ operation.

62. ____________________ is a file management technique that balances each file version’s storage cost with anticipated user demand for this version.

63. A(n) ____________________ backup is a variation on an incremental backup in which backup times aren’t reset as files are copied.

64. To an FMS, a(n) ____________________ is any change to file contents or attributes, such as an added record, a modified field, or changed access controls.

65. As applied to FMSs, ____________________ describes methods of securing file content against hardware failure.

66. ____________________ are contacts between a read/write head and a spinning platter.

67. ​When duplicate disks are in the same cabinet, mirroring is usually implemented in hardware by the ____________________.

68. ​The original RAID version, now known as RAID ____________________, was developed at the University of California, Berkeley, in the late 1980s.

69. In RAID, ____________________ improves read performance by breaking a large read operation into smaller parallel read operations.

70. The traditional model of storage access by application software relies on an approach commonly called ____________________.

71. ​A(n) ____________________ server accepts storage access requests from other servers and accesses embedded storage devices on their behalf.

72. The technologies that support cloud-based storage services are similar to those used to manage the contents of multilevel primary storage __________________.

73. ​Describe how secondary storage devices store bits, bytes and blocks.

74. What are steps that FMS follows to complete the file open operation?

75. Compare and contrast RAID 1 through 6.

76. Describe RAID 10.

77. List two reasons that RAID hardware systems are common.



No comments:

Post a Comment