TEST BANK OF SYSTEMS ARCHITECTURE 7TH EDITION BY BURD
IF You Want To Purchase A+ Work Then Click The Link
Below , Instant Download
Chapter 12 File and
Secondary Storage Management
1. The storage I/O control layer processes service calls
from the command layer or application program and issues commands to the
storage I/O control layer to interact with hardware.
|
2. An FMS provides command-layer functions and utility
programs for users and system administrators to manage files, directories,
and secondary storage devices.
|
3. Users and applications view secondary storage logically
as a collection of files organized in folders and storage volumes.
|
4. On larger computers such as servers, a volume can span
multiple physical secondary storage devices.
|
5. A typical laptop computer has up to a few hundred
storage volumes.
|
6. The logical view of secondary storage consists of files
contained within folders and storage volumes.
|
7. A laptop computer with Windows but no installed apps
supports over a dozen file types.
|
8. Most FMSs include direct support for only a few file
types but enable additional types to be defined and associated with installed
apps.
|
9. A graph folder structure is less flexible than a
hierarchical folder structure.
|
10. Allocation units can be smaller than the unit of data
transfer.
|
11. If the logical record size is less than the physical
record size, a single physical record might contain multiple logical records.
|
12. Low blocking factors, with larger logical records,
require fewer buffers to achieve substantial performance improvements.
|
13. In most FMSs, files are immediately removed from
secondary storage when they’re deleted.
|
14. Access controls are enforced automatically in FMS service
routines that access and manipulate files and directories.
|
15. File migration moves files from cloud storage to local
secondary storage devices as they become older and more out-of-date.
|
16. Disk mirroring provides a high degree of protection
against data loss with no performance penalty if it’s implemented in
hardware.
|
17. Storing parity data reduces a disk array’s usable
capacity.
|
18. DAS is inexpensive and efficient for organizations with
dozens or hundreds of servers and terabytes of shared data.
|
19. The storage server in a SAN is a complete
general-purpose computer.
|
20. A key distinction between SAN devices and NAS servers
is the type of storage access requests that are serviced.
|
21. The technologies that support cloud-based storage
services are similar to those used to manage the contents of multilevel
primary storage caches.
|
22. The technologies that support cloud-based storage
services are similar to those used to manage the contents of multilevel
primary storage caches.
|
23. The ____ is the part of the kernel that accesses
storage locations and manages data movement between storage devices and
memory.
|
24. The ____ layer is the bridge between logical and physical
views of secondary storage.
|
25. On a desktop or laptop computer, a ____ is usually an
entire physical secondary storage device, a partition of the device, or a
removable storage device such as a DVD or flash drive.
|
26. Among other things, ____ type determines naming
restrictions, allowable operations, and physical organization.
|
27. “Out of the box”, and with no installed apps, a typical
operating system directly defines/supports ____ of file types.
|
28. The relationship between file types and the programs or
OS utilities that manipulate them is called ____.
|
29. In a ____, folders can contain other folders, but a
folder can’t be contained in more than one parent.
|
30. The folder that’s currently being accessed is called
the ____ folder
|
31. A ____ is a data structure that records which
allocation units are free and which belong to files.
|
32. When the storage allocation table uses ____ data
structures sequential file access is very efficient but random access is much
less efficient.
|
33. A ____ is a collection of data items, or fields, that
an application program accesses as a single unit.
|
34. A ____ is the unit of storage transferred between the
device controller and memory in a single operation.
|
35. Blocking is described by a numeric ratio of logical
records to physical records called the ____.
|
36. A ____ is a temporary holding area for extracting
logical records from physical records.
|
37. In UNIX, the ____ privilege allows a user or process
can view a file’s contents.
|
38. In UNIX, the ____ privilege allows a user or process to
alter a file’s contents or delete it altogether.
|
39. In Windows NTFS, the ____ contains a sequential set of
file records, one for each file in the volume.
|
40. In a process called ____, a file’s original version is
archived automatically whenever the file is modified.
|
41. When a(n) ____ is performed, the FMS copies all files
and directories for an entire storage volume.
|
42. A(n) ____ archives only files that have been modified
since the previous incremental or full backup.
|
43. ____ is a fault-tolerance technique in which all disk
write operations are made simultaneously or concurrently to two storage
devices.
|
44. ____ is a disk storage technique that improves
performance and fault tolerance.
|
45. ____ breaks a unit of data into smaller segments and
stores these segments on multiple disks.
|
46. If five disks are used in a RAID 5 array, ____% of the
available disk space stores redundant parity information.
|
47. The most common example of multiple RAID levels layered
to combine their best features is ____.
|
48. ____ describes any architecture in which software
running on a CPU accesses secondary storage devices in the same computer.
|
49. A ____ is a high-speed interconnection between
general-purpose servers and a separate storage server.
|
50. The term ____ describes any architecture with a
dedicated storage server attached to a general-purpose network to handle
storage access requests from other servers.
|
51. A limited-purpose server is sometimes called a “____.”
|
52. The ____________________ layer provides service
functions for manipulating files and directories.
|
53. Via the ____________________ layer, users perform
common file management functions, such as copying, moving, and renaming
files.
|
54. A(n) ____________________ contains information about
files and other folders.
|
55. A(n) ____________________ path begins at the current
directory’s level and extends downward to a specific file.
|
56. A(n) ____________________ is the smallest number of
secondary storage bytes that can be allocated to a file.
|
57. A(n) ____________________ contains a single data item
within a logical record.
|
58. Logical record grouping in physical records is called
____________________.
|
59. If a physical record contains just one logical record,
the file is said to be ____________________.
|
60. The FMS uses ____________________ in primary storage to
store data temporarily as it moves between programs and secondary storage
devices.
|
61. A user might be able to recover a deleted file by
performing a(n) ____________________ operation.
|
62. ____________________ is a file management technique
that balances each file version’s storage cost with anticipated user demand
for this version.
|
63. A(n) ____________________ backup is a variation on an
incremental backup in which backup times aren’t reset as files are copied.
|
64. To an FMS, a(n) ____________________ is any change to
file contents or attributes, such as an added record, a modified field, or
changed access controls.
|
65. As applied to FMSs, ____________________ describes
methods of securing file content against hardware failure.
|
66. ____________________ are contacts between a read/write
head and a spinning platter.
|
67. When duplicate disks are in the same cabinet,
mirroring is usually implemented in hardware by the ____________________.
|
68. The original RAID version, now known as RAID
____________________, was developed at the University of California,
Berkeley, in the late 1980s.
|
69. In RAID, ____________________ improves read performance
by breaking a large read operation into smaller parallel read operations.
|
70. The traditional model of storage access by application
software relies on an approach commonly called ____________________.
|
71. A(n) ____________________ server accepts storage
access requests from other servers and accesses embedded storage devices on
their behalf.
|
72. The technologies that support cloud-based storage
services are similar to those used to manage the contents of multilevel
primary storage __________________.
|
73. Describe how secondary storage devices store bits,
bytes and blocks.
|
74. What are steps that FMS follows to complete the file
open operation?
|
75. Compare and contrast RAID 1 through 6.
|
77. List two reasons that RAID hardware systems are common.
|
No comments:
Post a Comment