Deck 12: File and Secondary Storage Management
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/77
Play
Full screen (f)
Deck 12: File and Secondary Storage Management
1
A key distinction between SAN devices and NAS servers is the type of storage access requests that are serviced.
True
2
Storing parity data reduces a disk array's usable capacity.
True
3
A graph folder structure is less flexible than a hierarchical folder structure.
False
4
On larger computers such as servers, a volume can span multiple physical secondary storage devices.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
5
A laptop computer with Windows but no installed apps supports over a dozen file types.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
6
Access controls are enforced automatically in FMS service routines that access and manipulate files and directories.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
7
Low blocking factors, with larger logical records, require fewer buffers to achieve substantial performance improvements.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
8
Users and applications view secondary storage logically as a collection of files organized in folders and storage volumes.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
9
The storage server in a SAN is a complete general-purpose computer.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
10
A typical laptop computer has up to a few hundred storage volumes.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
11
Most FMSs include direct support for only a few file types but enable additional types to be defined and associated with installed apps.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
12
Allocation units can be smaller than the unit of data transfer.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
13
If the logical record size is less than the physical record size, a single physical record might contain multiple logical records.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
14
The logical view of secondary storage consists of files contained within folders and storage volumes.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
15
DAS is inexpensive and efficient for organizations with dozens or hundreds of servers and terabytes of shared data.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
16
In most FMSs, files are immediately removed from secondary storage when they're deleted.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
17
Disk mirroring provides a high degree of protection against data loss with no performance penalty if it's implemented in hardware.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
18
An FMS provides command-layer functions and utility programs for users and system administrators to manage files, directories, and secondary storage devices.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
19
The storage I/O control layer processes service calls from the command layer or application program and issues commands to the storage I/O control layer to interact with hardware.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
20
File migration moves files from cloud storage to local secondary storage devices as they become older and more out-of-date.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
21
The technologies that support cloud-based storage services are similar to those used to manage the contents of multilevel primary storage caches.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
22
Blocking is described by a numeric ratio of logical records to physical records called the ____.
A) holding factor
B) locking factor
C) group factor
D) blocking factor
A) holding factor
B) locking factor
C) group factor
D) blocking factor
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
23
"Out of the box", and with no installed apps, a typical operating system directly defines/supports ____ of file types.
A) a handful
B) a few dozen
C) hundreds
D) thousands
A) a handful
B) a few dozen
C) hundreds
D) thousands
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
24
The technologies that support cloud-based storage services are similar to those used to manage the contents of multilevel primary storage caches.
A) disk management system
B) storage management system
C) file management system
D) control management system
A) disk management system
B) storage management system
C) file management system
D) control management system
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
25
In UNIX, the ____ privilege allows a user or process to alter a file's contents or delete it altogether.
A) read
B) execute
C) write
D) special
A) read
B) execute
C) write
D) special
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
26
The folder that's currently being accessed is called the ____ folder
A) previous
B) next
C) working
D) index
A) previous
B) next
C) working
D) index
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
27
In UNIX, the ____ privilege allows a user or process can view a file's contents.
A) read
B) write
C) execute
D) special
A) read
B) write
C) execute
D) special
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
28
In a ____, folders can contain other folders, but a folder can't be contained in more than one parent.
A) linear folder structure
B) logical folder structure
C) virtual folder structure
D) hierarchical folder structure
A) linear folder structure
B) logical folder structure
C) virtual folder structure
D) hierarchical folder structure
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
29
In Windows NTFS, the ____ contains a sequential set of file records, one for each file in the volume.
A) master node
B) storage allocation table
C) file allocation table
D) master file table
A) master node
B) storage allocation table
C) file allocation table
D) master file table
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
30
When the storage allocation table uses ____ data structures sequential file access is very efficient but random access is much less efficient.
A) linked lists
B) B+ trees
C) binary trees
D) hash tables
A) linked lists
B) B+ trees
C) binary trees
D) hash tables
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
31
A ____ is a temporary holding area for extracting logical records from physical records.
A) block
B) buffer
C) page
D) cache
A) block
B) buffer
C) page
D) cache
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
32
A ____ is a data structure that records which allocation units are free and which belong to files.
A) file allocation table
B) master file table
C) master node
D) storage allocation table
A) file allocation table
B) master file table
C) master node
D) storage allocation table
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
33
The ____ is the part of the kernel that accesses storage locations and manages data movement between storage devices and memory.
A) store I/O control manager
B) storage I/O control layer
C) disk I/O control layer
D) disk I/O control supervisor
A) store I/O control manager
B) storage I/O control layer
C) disk I/O control layer
D) disk I/O control supervisor
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
34
On a desktop or laptop computer, a ____ is usually an entire physical secondary storage device, a partition of the device, or a removable storage device such as a DVD or flash drive.
A) page
B) block
C) sector
D) sector
A) page
B) block
C) sector
D) sector
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
35
A ____ is the unit of storage transferred between the device controller and memory in a single operation.
A) virtual record
B) physical record
C) logical record
D) hard record
A) virtual record
B) physical record
C) logical record
D) hard record
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
36
The relationship between file types and the programs or OS utilities that manipulate them is called ____.
A) file launcher
B) file association
C) shell
D) folder manager
A) file launcher
B) file association
C) shell
D) folder manager
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
37
Among other things, ____ type determines naming restrictions, allowable operations, and physical organization.
A) volume
B) folder
C) file
D) storage device
A) volume
B) folder
C) file
D) storage device
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
38
In a process called ____, a file's original version is archived automatically whenever the file is modified.
A) differencing
B) chaining
C) file migration
D) partitioning
A) differencing
B) chaining
C) file migration
D) partitioning
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
39
A ____ is a collection of data items, or fields, that an application program accesses as a single unit.
A) physical record
B) virtual record
C) logical record
D) managed record
A) physical record
B) virtual record
C) logical record
D) managed record
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
40
The ____ layer is the bridge between logical and physical views of secondary storage.
A) file control
B) disk control
C) storage I/O control
D) block control
A) file control
B) disk control
C) storage I/O control
D) block control
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
41
If a physical record contains just one logical record, the file is said to be ____________________.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
42
Via the ____________________ layer, users perform common file management functions, such as copying, moving, and renaming files.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
43
The most common example of multiple RAID levels layered to combine their best features is ____.
A) RAID 0
B) RAID 1
C) RAID 5
D) RAID 10
A) RAID 0
B) RAID 1
C) RAID 5
D) RAID 10
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
44
A(n) ____________________ contains a single data item within a logical record.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
45
A(n) ____________________ is the smallest number of secondary storage bytes that can be allocated to a file.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
46
____ is a disk storage technique that improves performance and fault tolerance.
A) DIR
B) RAID
C) PAID
D) PAIR
A) DIR
B) RAID
C) PAID
D) PAIR
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
47
A(n) ____________________ contains information about files and other folders.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
48
The FMS uses ____________________ in primary storage to store data temporarily as it moves between programs and secondary storage devices.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
49
A(n) ____ archives only files that have been modified since the previous incremental or full backup.
A) full backup
B) incremental backup
C) differential backup
D) synthetic full backup
A) full backup
B) incremental backup
C) differential backup
D) synthetic full backup
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
50
A(n) ____________________ path begins at the current directory's level and extends downward to a specific file.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
51
If five disks are used in a RAID 5 array, ____% of the available disk space stores redundant parity information.
A) 10
B) 15
C) 20
D) 25
A) 10
B) 15
C) 20
D) 25
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
52
A ____ is a high-speed interconnection between general-purpose servers and a separate storage server.
A) network area storage
B) storage accelerated network
C) storage area network
D) storage area network
A) network area storage
B) storage accelerated network
C) storage area network
D) storage area network
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
53
Logical record grouping in physical records is called ____________________.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
54
____ breaks a unit of data into smaller segments and stores these segments on multiple disks.
A) Data striping
B) Data mirroring
C) Data checking
D) Data cloning
A) Data striping
B) Data mirroring
C) Data checking
D) Data cloning
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
55
The term ____ describes any architecture with a dedicated storage server attached to a general-purpose network to handle storage access requests from other servers.
A) storage area network
B) direct attached storage
C) network-local storage
D) network-attached storage
A) storage area network
B) direct attached storage
C) network-local storage
D) network-attached storage
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
56
When a(n) ____ is performed, the FMS copies all files and directories for an entire storage volume.
A) full backup
B) incremental backup
C) differential backup
D) synthetic full backup
A) full backup
B) incremental backup
C) differential backup
D) synthetic full backup
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
57
____ describes any architecture in which software running on a CPU accesses secondary storage devices in the same computer.
A) NAS
B) DAS
C) SAN
D) DAN
A) NAS
B) DAS
C) SAN
D) DAN
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
58
____ is a fault-tolerance technique in which all disk write operations are made simultaneously or concurrently to two storage devices.
A) Disk partitioning
B) Disk planning
C) Disk locking
D) Disk mirroring
A) Disk partitioning
B) Disk planning
C) Disk locking
D) Disk mirroring
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
59
The ____________________ layer provides service functions for manipulating files and directories.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
60
A limited-purpose server is sometimes called a "____."
A) server appliance
B) server host
C) general purpose server
D) standard server
A) server appliance
B) server host
C) general purpose server
D) standard server
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
61
The technologies that support cloud-based storage services are similar to those used to manage the contents of multilevel primary storage __________________.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
62
A user might be able to recover a deleted file by performing a(n) ____________________ operation.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
63
In RAID, ____________________ improves read performance by breaking a large read operation into smaller parallel read operations.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
64
What are steps that FMS follows to complete the file open operation?
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
65
____________________ is a file management technique that balances each file version's storage cost with anticipated user demand for this version.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
66
Compare and contrast RAID 1 through 6.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
67
Describe how secondary storage devices store bits, bytes and blocks.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
68
____________________ are contacts between a read/write head and a spinning platter.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
69
A(n) ____________________ backup is a variation on an incremental backup in which backup times aren't reset as files are copied.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
70
The traditional model of storage access by application software relies on an approach commonly called ____________________.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
71
A(n) ____________________ server accepts storage access requests from other servers and accesses embedded storage devices on their behalf.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
72
As applied to FMSs, ____________________ describes methods of securing file content against hardware failure.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
73
When duplicate disks are in the same cabinet, mirroring is usually implemented in hardware by the ____________________.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
74
List two reasons that RAID hardware systems are common.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
75
To an FMS, a(n) ____________________ is any change to file contents or attributes, such as an added record, a modified field, or changed access controls.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
76
Describe RAID 10.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck
77
The original RAID version, now known as RAID ____________________, was developed at the University of California, Berkeley, in the late 1980s.
Unlock Deck
Unlock for access to all 77 flashcards in this deck.
Unlock Deck
k this deck