1. Chapter 9. Question 1
Answer the two video case study questions for this assignment. Use an MS Word document with your name, the module number, and title of the assignment on the page. Your answers must be 300-500 words in length, in paragraph form, grammatically sound, and free of spelling errors.
2. Chapter 9. Question 21
Describe the differences between CSMA/CD and CSMA/CA. Provide one real
life example where CSMA/CD is used. Provide one real life example where
CSMA/CA is used.
3. Chapter 10. Question 4
Several levels of file access were discussed in this chapter, including read/
write, read-only, execute-only, and no access. Assume you maintain a
database containing confidential patient information and need to restrict
UPDATE to only 5 individuals, allow only 15 others to view the database,
and disallow any database access to all other users. Which access level would
you assign to the 20 individuals in the first two groups and to the remaining
users? For each of the three groups, describe every type of access granted to
each one.
4. Chapter 10. Question 8
Deadlocks are discussed in Chapter 5. Describe how a DO/S Processor
Manager could attempt to avoid them in a real-life network. Then describe
how it could try to recover gracefully if one should occur.
5. Chapter 10. Question 14
Describe the top 10 critical duties of a network administrator for a distributed
operating system. Identify which level of access would be needed by the
administrator for each duty and explain why.
6. Chapter 11. Question 1
Imagine that you are the manager of a small business computing center. List at
least three techniques that you would use to convince a busy, reluctant night
operator to perform regular backups. Explain the best and worst possible
technique to assure your success.
7. Chapter 11. Question 4
Describe the advantages and disadvantages of password generator software.
Would you recommend the use of such software for your own system? Explain
why or why not.
8. Chapter 11. Question 7
Given multi-network access, it’s not unusual for users to have multiple
user identifications and passwords. How would you manage these multi-
password situations? Describe both the advantages and disadvantages of
your solution.
9. Chapter 12. Question 6
Review the system with one CPU and four drives below:
• CPU W = 4 ms (the average time to execute 1,000 instructions)
• Drive A = 45 ms (average data access speed)
• Drive B = 3 ms (average data access speed)
• Drive C = 17 ms (average data access speed)
• Drive D = 10 ms (average data access speed)
Calculate I/O access speed using this CPU and each of the four disk drives as
they evaluate the following track requests in this order: 0, 31, 20, 15, 20, 31, 15.
Then, in each case, calculate the access speeds after the track requests are
reordered and rank the four disk drives before and after reordering.
10. Chapter 12. Question 11
Calculate the reliability of a hard disk drive with an MTBF of 2,499 hours
during the last 40 hours of this month. Assume e = 2.71828 and use the
formula:
Reliability(t) =e -(1/MTBF)(t)
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more