Deck 23: About I/O Devices, Backup Strategies, and Layered Architecture In Computing

Full screen (f)
exit full mode
Question
The advantage of I/O mapped devices to memory mapped is __________

A)the former offers faster transfer of data
B)the devices connected using i/o mapping have a bigger buffer space
C)the devices have to deal with fewer address lines
D)no advantage as such
Use Space or
up arrow
down arrow
to flip the card.
Question
The system is notified of a read or write operation by __________

A)appending an extra bit of the address
B)enabling the read or write bits of the devices
C)raising an appropriate interrupt signal
D)sending a special signal along the bus
Question
To overcome the lag in the operating speeds of the I/O device and the processor we use __________

A)buffer spaces
B)status flags
C)interrupt signals
D)exceptions
Question
The method of synchronising the processor with the I/O device in which the device sends a signal when it is ready is?

A)exceptions
B)signal handling
C)interrupts
D)dma
Question
The method which offers higher speeds of I/O transfers is __________

A)interrupts
B)memory mapping
C)program-controlled i/o
D)dma
Question
The process wherein the processor constantly checks the status flags is called as

A)polling
B)inspection
C)reviewing
D)echoing
Question
The purpose of backup is:

A)to restore a computer to an operational state following a disaster
B)to restore small numbers of files after they have been accidentally deleted
C)to restore one among many version of the same file for multiple backup environment
D)all of the mentioned
Question
Backup of the source data can be created

A)on the same device
B)on another device
C)at some other location
D)all of the mentioned
Question
Which of the following backup technique is most space efficient?

A)full backup
B)incremental backup
C)differential backup
D)all of the mentioned
Question
Which of the following statements are true?

A)data can be recovered fastest in online backup
B)tape library is an example of nearline storage
C)data recovery can take hours for offline backup
D)all of the mentioned
Question
Which of the following qualifies as best DR (Disaster Recovery) site?

A)dr site in the same campus
B)dr site in the same city
C)dr site in the same country
D)dr site in a different country
Question
Which of the following techniques can be used for optimizing backed up data space?

A)encryption and deduplication
B)compression and deduplication
C)authentication and deduplication
D)deduplication only
Question
To decide on a backup strategy for your organization, which of the following should you consider?

A)rpo (recovery point objective)
B)rto (recovery time objective)
C)both rpo & rto
D)none of the mentioned
Question
Which of the following can be used for reducing recovery time?

A)automatic failover
B)by taking backup on a faster device
C)taking multiple backups - one in same location, another at different location
D)all of the mentioned
Question
Which of the following is false?

A)the more important the data, the greater the need for backing it up
B)a backup is as useful as its associated restore strategy
C)storing the backup copy near to its original site is best strategy
D)automated backup and scheduling is preferred over manual operations
Question
Which of the following is Backup software?

A)amanda
B)bacula
C)ibm tivoli storage manager
D)all of the mentioned
Question
Which of the following is incorrect?

A)a layered-style program is divided into an array of modules or layers
B)each layer provides services to the layer "below" and makes use of services provided by the layer "above"
C)all of the mentioned
D)none of the mentioned
Question
What is Relaxed Layered Style?

A)each layer can be constrained to use only the layer directly below it
B)sometimes this constraint is relaxed slightly to allow each layer to use all the layers below it
C)all of the mentioned
D)none of the mentioned
Question
Which of the following is correct?

A)module a uses module b if a correct version of b must be present for a to execute correctly
B)module a calls (or invokes ) module b if b triggers execution of a
C)all of the mentioned
D)none of the mentioned
Question
Which of the following is true with respect to layered architecture?

A)each layer is allowed to depend on the layer above it being present and correct
B)a layer may call other layers above and below it, as long as it uses them
C)all of the mentioned
D)none of the mentioned
Question
What is Onion diagram illustrates?

A)it illustrates the connection between the layers in communications protocols, such as the international standards organization open systems interconnection (iso osi) model,or the layers in user interface and windowing systems, such as the x window system
B)it often illustrates operating system layers, with the kernel at the core
C)all of the mentioned
D)none of the mentioned
Question
In particular, layers have which of the following characteristics?

A)layers are by definition highly cohesive, thus satisfying the principle of cohesion
B)layers doesn't support information hiding
C)layers are constrained to use only above layers
D)all of the mentioned
Question
What are the drawbacks for Layers?

A)it is often necessary to pass data through many layers, which can slow performance significantly
B)layers support information hiding
C)multi-layered programs can be hard to debug because operations tend to be implemented through a series of calls across layers
D)none of the mentioned
Question
Which of the following is correct?

A)layers are not strongly coupled to the layers above them
B)each layer is strongly coupled only to the layer immediately below it
C)overall layered-style architectures are loosely coupled
D)all of the mentioned
Question
Which of the following is one of the unique attributes of Cloud Computing?

A)utility type of delivery
B)elasticity
C)low barrier to entry
D)all of the mentioned
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 23: About I/O Devices, Backup Strategies, and Layered Architecture In Computing
1
The advantage of I/O mapped devices to memory mapped is __________

A)the former offers faster transfer of data
B)the devices connected using i/o mapping have a bigger buffer space
C)the devices have to deal with fewer address lines
D)no advantage as such
the devices have to deal with fewer address lines
2
The system is notified of a read or write operation by __________

A)appending an extra bit of the address
B)enabling the read or write bits of the devices
C)raising an appropriate interrupt signal
D)sending a special signal along the bus
sending a special signal along the bus
3
To overcome the lag in the operating speeds of the I/O device and the processor we use __________

A)buffer spaces
B)status flags
C)interrupt signals
D)exceptions
status flags
4
The method of synchronising the processor with the I/O device in which the device sends a signal when it is ready is?

A)exceptions
B)signal handling
C)interrupts
D)dma
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
The method which offers higher speeds of I/O transfers is __________

A)interrupts
B)memory mapping
C)program-controlled i/o
D)dma
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
The process wherein the processor constantly checks the status flags is called as

A)polling
B)inspection
C)reviewing
D)echoing
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
The purpose of backup is:

A)to restore a computer to an operational state following a disaster
B)to restore small numbers of files after they have been accidentally deleted
C)to restore one among many version of the same file for multiple backup environment
D)all of the mentioned
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
Backup of the source data can be created

A)on the same device
B)on another device
C)at some other location
D)all of the mentioned
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following backup technique is most space efficient?

A)full backup
B)incremental backup
C)differential backup
D)all of the mentioned
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following statements are true?

A)data can be recovered fastest in online backup
B)tape library is an example of nearline storage
C)data recovery can take hours for offline backup
D)all of the mentioned
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following qualifies as best DR (Disaster Recovery) site?

A)dr site in the same campus
B)dr site in the same city
C)dr site in the same country
D)dr site in a different country
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following techniques can be used for optimizing backed up data space?

A)encryption and deduplication
B)compression and deduplication
C)authentication and deduplication
D)deduplication only
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
To decide on a backup strategy for your organization, which of the following should you consider?

A)rpo (recovery point objective)
B)rto (recovery time objective)
C)both rpo & rto
D)none of the mentioned
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following can be used for reducing recovery time?

A)automatic failover
B)by taking backup on a faster device
C)taking multiple backups - one in same location, another at different location
D)all of the mentioned
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is false?

A)the more important the data, the greater the need for backing it up
B)a backup is as useful as its associated restore strategy
C)storing the backup copy near to its original site is best strategy
D)automated backup and scheduling is preferred over manual operations
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following is Backup software?

A)amanda
B)bacula
C)ibm tivoli storage manager
D)all of the mentioned
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is incorrect?

A)a layered-style program is divided into an array of modules or layers
B)each layer provides services to the layer "below" and makes use of services provided by the layer "above"
C)all of the mentioned
D)none of the mentioned
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
What is Relaxed Layered Style?

A)each layer can be constrained to use only the layer directly below it
B)sometimes this constraint is relaxed slightly to allow each layer to use all the layers below it
C)all of the mentioned
D)none of the mentioned
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following is correct?

A)module a uses module b if a correct version of b must be present for a to execute correctly
B)module a calls (or invokes ) module b if b triggers execution of a
C)all of the mentioned
D)none of the mentioned
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following is true with respect to layered architecture?

A)each layer is allowed to depend on the layer above it being present and correct
B)a layer may call other layers above and below it, as long as it uses them
C)all of the mentioned
D)none of the mentioned
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
What is Onion diagram illustrates?

A)it illustrates the connection between the layers in communications protocols, such as the international standards organization open systems interconnection (iso osi) model,or the layers in user interface and windowing systems, such as the x window system
B)it often illustrates operating system layers, with the kernel at the core
C)all of the mentioned
D)none of the mentioned
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
In particular, layers have which of the following characteristics?

A)layers are by definition highly cohesive, thus satisfying the principle of cohesion
B)layers doesn't support information hiding
C)layers are constrained to use only above layers
D)all of the mentioned
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
What are the drawbacks for Layers?

A)it is often necessary to pass data through many layers, which can slow performance significantly
B)layers support information hiding
C)multi-layered programs can be hard to debug because operations tend to be implemented through a series of calls across layers
D)none of the mentioned
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following is correct?

A)layers are not strongly coupled to the layers above them
B)each layer is strongly coupled only to the layer immediately below it
C)overall layered-style architectures are loosely coupled
D)all of the mentioned
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following is one of the unique attributes of Cloud Computing?

A)utility type of delivery
B)elasticity
C)low barrier to entry
D)all of the mentioned
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 25 flashcards in this deck.