Assignment | Applied Sciences homework help

Category: Applied Sciences

1. Chapter 9. Question 1

   Answer the two video case study questions for this assignment. Use an MS Word document with your name, the module number, and title of the assignment on the page. Your answers must be 300-500 words in length, in paragraph form, grammatically sound, and free of spelling errors.  

2. Chapter 9. Question 21

Describe the differences between CSMA/CD and CSMA/CA. Provide one real 

life example where CSMA/CD is used. Provide one real life example where 

CSMA/CA is used.

3. Chapter 10. Question 4

Several levels of file access were discussed in this chapter, including read/

write, read-only, execute-only, and no access. Assume you maintain a 

database  containing confidential patient information and need to restrict 

UPDATE to only 5 individuals, allow only 15 others to view the database, 

and disallow any database access to all other users. Which access level would 

you assign to the 20 individuals in the first two groups and to the remaining 

users? For each of the three groups, describe every type of access granted to 

each one.

4. Chapter 10. Question 8

Deadlocks are discussed in Chapter 5. Describe how a DO/S Processor 

Manager could attempt to avoid them in a real-life network. Then describe 

how it could try to recover gracefully if one should occur.

5. Chapter 10. Question 14

Describe the top 10 critical duties of a network administrator for a  distributed 

operating system. Identify which level of access would be needed by the 

 administrator for each duty and explain why.

6. Chapter 11. Question 1

Imagine that you are the manager of a small business computing center. List at 

least three techniques that you would use to convince a busy, reluctant night 

operator to perform regular backups. Explain the best and worst possible 

 technique to assure your success.

7. Chapter 11. Question 4

Describe the advantages and disadvantages of password generator software. 

Would you recommend the use of such software for your own system? Explain 

why or why not.

8. Chapter 11. Question 7

Given multi-network access, it’s not unusual for users to have multiple 

user identifications and passwords. How would you manage these multi-

password situations? Describe both the advantages and disadvantages of 

your solution.

9. Chapter 12. Question 6

Review the system with one CPU and four drives below:

• CPU W = 4 ms (the average time to execute 1,000 instructions)

• Drive A = 45 ms (average data access speed)

• Drive B = 3 ms (average data access speed)

• Drive C = 17 ms (average data access speed)

• Drive D = 10 ms (average data access speed)

Calculate I/O access speed using this CPU and each of the four disk drives as 

they evaluate the following track requests in this order: 0, 31, 20, 15, 20, 31, 15. 

Then, in each case, calculate the access speeds after the track requests are 

reordered and rank the four disk drives before and after reordering.

10. Chapter 12. Question 11

Calculate the reliability of a hard disk drive with an MTBF of 2,499 hours 

during the last 40 hours of this month. Assume e = 2.71828 and use the 

formula:

Reliability(t) =e -(1/MTBF)(t)

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Pay Someone To Write Essay