Exam 9: Network Operating Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

MATCHING Match each item with a statement below: a.LDAP f.NTFS b.3-tier architecture g.CIFS c.per user h.mapping d.per seat i.root e.tree -A protocol used to access information stored in a directory.

(Short Answer)
4.8/5
(34)

Describe symmetric multiprocessing and asymmetric multiprocessing.

(Essay)
4.8/5
(35)

The printer queue is a ____ representation of the printer's input and output.

(Multiple Choice)
4.7/5
(41)

Explain why multitasking does not mean performing more than one operation simultaneously.Be sure to define preemptive multitasking.

(Essay)
4.8/5
(30)

In LDAP-compatible directories,a(n)____________________ is the set of definitions of the kinds of objects and object-related information that the directory can contain.

(Short Answer)
4.9/5
(43)

MATCHING Match each item with a statement below: a.LDAP f.NTFS b.3-tier architecture g.CIFS c.per user h.mapping d.per seat i.root e.tree -A licensing mode that allows a fixed quantity of clients to use one software package simultaneously.

(Short Answer)
4.9/5
(30)

Identify eight features of NTFS.

(Essay)
4.8/5
(32)

____ is one of the most important functions an NOS provides.

(Multiple Choice)
4.8/5
(35)

The core of all UNIX and Linux systems is called the kernel.

(True/False)
4.8/5
(36)

A GUID (globally unique identifier)is a 128-bit number that ensures that no two objects have ____ names.

(Multiple Choice)
4.9/5
(37)

Describe how the Windows Server 2008,Standard Edition,memory model works.

(Essay)
4.8/5
(39)

The term domain model refers to a type of peer-to-peer network that relies on domains rather than on workgroups.

(True/False)
4.9/5
(33)

Describe the UNIX memory model in terms of addressing scheme and virtual memory.

(Essay)
4.7/5
(39)

Naming (or addressing)conventions in Active Directory are based on the ____ naming conventions.

(Multiple Choice)
4.9/5
(44)

In UNIX,you combine commands using a pipe,which is entered as a forward slash ( / ).

(True/False)
4.8/5
(40)

The directory containing information about objects in a domain resides on computers called ____ controllers.

(Multiple Choice)
4.7/5
(34)

A piece of software called ____ translates requests and responses between a client and a server.

(Multiple Choice)
4.9/5
(32)

____ memory may be logically carved out of space on the hard drive for temporary use.

(Multiple Choice)
4.8/5
(35)

The primary function of the UNIX ____ is to coordinate access to all your computer's hardware,such as the disks,memory,keyboard,and monitor.

(Multiple Choice)
4.7/5
(36)

Describe three advantages of choosing a proprietary UNIX system.

(Essay)
4.8/5
(31)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)