Deck 9: Network Operating Systems
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 9: Network Operating Systems
1
A piece of software called ____ translates requests and responses between a client and a server.
A) kernel module
B) shell
C) middleware
D) firmware
A) kernel module
B) shell
C) middleware
D) firmware
C
2
The directory containing information about objects in a domain resides on computers called ____ controllers.
A) OU
B) domain
C) database
D) server
A) OU
B) domain
C) database
D) server
B
3
A(n)____ is the record of a user that contains all of his properties,including rights to resources,password,name,and so on.
A) shell
B) container
C) account
D) directory
A) shell
B) container
C) account
D) directory
C
4
A benefit to using an NTFS partition is that it can be read by older operating systems,such as Windows 95,Windows 2000 Professional,and early versions of UNIX.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
In every NOS,groups form the basis for resource and account management.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
The core of all UNIX and Linux systems is called the kernel.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
The printer queue is a ____ representation of the printer's input and output.
A) virtual
B) logical
C) physical
D) hierarchical
A) virtual
B) logical
C) physical
D) hierarchical
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
____ is one of the most important functions an NOS provides.
A) Client support
B) Printer sharing
C) Authentication
D) Memory management
A) Client support
B) Printer sharing
C) Authentication
D) Memory management
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
A(n)____ is a pictorial representation of computer functions that,in the case of NOSs,enables administrators to manage files,users,groups,security,printers,and so on.
A) snapshot
B) shortcut
C) icon
D) GUI
A) snapshot
B) shortcut
C) icon
D) GUI
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
A(n)____ is a routine of sequential instructions that runs until it has achieved its goal.
A) process
B) thread
C) activity
D) job
A) process
B) thread
C) activity
D) job
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Active Directory organizes multiple domains hierarchically in a domain ____.
A) OU
B) directory
C) tree
D) bucket
A) OU
B) directory
C) tree
D) bucket
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
A workgroup is a group of interconnected computers that share each other's resources without relying on a central ____.
A) OU
B) domain
C) database
D) server
A) OU
B) domain
C) database
D) server
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
The term ____ memory refers to the RAM chips that are installed on the computer's system board and whose sole function is to provide memory to that machine.
A) virtual
B) logical
C) physical
D) hierarchical
A) virtual
B) logical
C) physical
D) hierarchical
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
____ memory may be logically carved out of space on the hard drive for temporary use.
A) Virtual
B) Logical
C) Physical
D) Hierarchical
A) Virtual
B) Logical
C) Physical
D) Hierarchical
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
A(n)____ is a self-contained,well-defined task within a process.
A) task
B) thread
C) activity
D) job
A) task
B) thread
C) activity
D) job
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
The support and use of multiple processors to handle multiple threads is known as ____.
A) multiprocessing
B) multitasking
C) multithreading
D) multisharing
A) multiprocessing
B) multitasking
C) multithreading
D) multisharing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
The term domain model refers to a type of peer-to-peer network that relies on domains rather than on workgroups.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
A(n)____ is a list that organizes resources and associates them with their characteristics.
A) file inode
B) container
C) account
D) directory
A) file inode
B) container
C) account
D) directory
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
In UNIX,you combine commands using a pipe,which is entered as a forward slash ( / ).
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
The process of copying directory data to multiple domain controllers is known as ____.
A) replication
B) duplication
C) correlation
D) sharing
A) replication
B) duplication
C) correlation
D) sharing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
A(n)____________________ is a group of users,servers,and other resources that share a centralized database of account and security information.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
In LDAP-compatible directories,a(n)____________________ is the set of definitions of the kinds of objects and object-related information that the directory can contain.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
MATCHING
Match each item with a statement below:
a.LDAP
f.NTFS
b.3-tier architecture
g.CIFS
c.per user
h.mapping
d.per seat
i.root
e.tree
A file system developed by Microsoft and used with its Windows NT,Windows 2000 Server,Windows Server 2003,and Windows 2008 operating systems.
Match each item with a statement below:
a.LDAP
f.NTFS
b.3-tier architecture
g.CIFS
c.per user
h.mapping
d.per seat
i.root
e.tree
A file system developed by Microsoft and used with its Windows NT,Windows 2000 Server,Windows Server 2003,and Windows 2008 operating systems.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
MATCHING
Match each item with a statement below:
a.LDAP
f.NTFS
b.3-tier architecture
g.CIFS
c.per user
h.mapping
d.per seat
i.root
e.tree
A logical representation of multiple,hierarchical levels within a directory.
Match each item with a statement below:
a.LDAP
f.NTFS
b.3-tier architecture
g.CIFS
c.per user
h.mapping
d.per seat
i.root
e.tree
A logical representation of multiple,hierarchical levels within a directory.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
MATCHING
Match each item with a statement below:
a.LDAP
f.NTFS
b.3-tier architecture
g.CIFS
c.per user
h.mapping
d.per seat
i.root
e.tree
Administrator account on a UNIX or Linux system.
Match each item with a statement below:
a.LDAP
f.NTFS
b.3-tier architecture
g.CIFS
c.per user
h.mapping
d.per seat
i.root
e.tree
Administrator account on a UNIX or Linux system.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Every UNIX and Linux system contains full documentation of UNIX commands in the ____ pages.
A) doc
B) library
C) man
D) command
A) doc
B) library
C) man
D) command
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Naming (or addressing)conventions in Active Directory are based on the ____ naming conventions.
A) SMB
B) LDAP
C) NTFS
D) NFS
A) SMB
B) LDAP
C) NTFS
D) NFS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
The most privileged user account on an NOS is the ____________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
MATCHING
Match each item with a statement below:
a.LDAP
f.NTFS
b.3-tier architecture
g.CIFS
c.per user
h.mapping
d.per seat
i.root
e.tree
A licensing mode that allows a fixed quantity of clients to use one software package simultaneously.
Match each item with a statement below:
a.LDAP
f.NTFS
b.3-tier architecture
g.CIFS
c.per user
h.mapping
d.per seat
i.root
e.tree
A licensing mode that allows a fixed quantity of clients to use one software package simultaneously.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
A service on the client workstation,called the ____________________,intercepts a request to determine whether it should be handled by the client or by the server.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
MATCHING
Match each item with a statement below:
a.LDAP
f.NTFS
b.3-tier architecture
g.CIFS
c.per user
h.mapping
d.per seat
i.root
e.tree
A client/server environment that incorporates middleware.
Match each item with a statement below:
a.LDAP
f.NTFS
b.3-tier architecture
g.CIFS
c.per user
h.mapping
d.per seat
i.root
e.tree
A client/server environment that incorporates middleware.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
____________________ is the execution of multiple tasks at one time.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
MATCHING
Match each item with a statement below:
a.LDAP
f.NTFS
b.3-tier architecture
g.CIFS
c.per user
h.mapping
d.per seat
i.root
e.tree
Involves associating a letter,such as M or T,with a disk,directory,or other resource.
Match each item with a statement below:
a.LDAP
f.NTFS
b.3-tier architecture
g.CIFS
c.per user
h.mapping
d.per seat
i.root
e.tree
Involves associating a letter,such as M or T,with a disk,directory,or other resource.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
UNIX was one of the first operating systems to implement a ____ file system.
A) virtual
B) logical
C) physical
D) hierarchical
A) virtual
B) logical
C) physical
D) hierarchical
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
MATCHING
Match each item with a statement below:
a.LDAP
f.NTFS
b.3-tier architecture
g.CIFS
c.per user
h.mapping
d.per seat
i.root
e.tree
A licensing mode that limits access to an application to specific users or workstations.
Match each item with a statement below:
a.LDAP
f.NTFS
b.3-tier architecture
g.CIFS
c.per user
h.mapping
d.per seat
i.root
e.tree
A licensing mode that limits access to an application to specific users or workstations.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
A GUID (globally unique identifier)is a 128-bit number that ensures that no two objects have ____ names.
A) similar
B) duplicate
C) opposing
D) non-standard
A) similar
B) duplicate
C) opposing
D) non-standard
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Solaris employs the file system called ____ for its native file system type.
A) UFS
B) NTFS
C) ext3
D) NFS
A) UFS
B) NTFS
C) ext3
D) NFS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
MATCHING
Match each item with a statement below:
a.LDAP
f.NTFS
b.3-tier architecture
g.CIFS
c.per user
h.mapping
d.per seat
i.root
e.tree
A Windows XP client communicates with a Windows Server 2008 server using this file system.
Match each item with a statement below:
a.LDAP
f.NTFS
b.3-tier architecture
g.CIFS
c.per user
h.mapping
d.per seat
i.root
e.tree
A Windows XP client communicates with a Windows Server 2008 server using this file system.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
MATCHING
Match each item with a statement below:
a.LDAP
f.NTFS
b.3-tier architecture
g.CIFS
c.per user
h.mapping
d.per seat
i.root
e.tree
A protocol used to access information stored in a directory.
Match each item with a statement below:
a.LDAP
f.NTFS
b.3-tier architecture
g.CIFS
c.per user
h.mapping
d.per seat
i.root
e.tree
A protocol used to access information stored in a directory.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
The primary function of the UNIX ____ is to coordinate access to all your computer's hardware,such as the disks,memory,keyboard,and monitor.
A) kernel
B) root
C) directory system
D) pipe system
A) kernel
B) root
C) directory system
D) pipe system
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Identify eight features of NTFS.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Explain how UNIX and Linux handle multiprocessing.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Describe symmetric multiprocessing and asymmetric multiprocessing.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Describe three advantages of choosing a proprietary UNIX system.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Briefly explain Active Directory two-way transitive trusts.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Describe how the Windows Server 2008,Standard Edition,memory model works.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Describe the two types of definitions in a directory's schema.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Describe the key difference between freely distributable UNIX and proprietary implementations.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Describe the UNIX memory model in terms of addressing scheme and virtual memory.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Explain why multitasking does not mean performing more than one operation simultaneously.Be sure to define preemptive multitasking.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck