chabot college chapter 8 review semester iiielec 99.09 semester iii elec 99.09

9
Chabot College Chabot College Chapter 8 Review Chapter 8 Review Semester III Semester III ELEC 99.09 ELEC 99.09

Upload: vivian-ryan

Post on 13-Dec-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Chabot College Chapter 8 Review Semester IIIELEC 99.09 Semester III ELEC 99.09

Chabot CollegeChabot College

Chapter 8 ReviewChapter 8 Review

Semester IIISemester III ELEC 99.09ELEC 99.09

Page 2: Chabot College Chapter 8 Review Semester IIIELEC 99.09 Semester III ELEC 99.09

DocumentationDocumentation

• Documentation is the most critical component of good network administration.

• Documentation is the least implemented component of network administration.

• A maintenance record is used to keep a list of equipment repairs.

• Rack mount location is included in MDF and IDF documentation.

• Software listings would NOT be found on security documentation.

Page 3: Chabot College Chapter 8 Review Semester IIIELEC 99.09 Semester III ELEC 99.09

DocumentationDocumentation

• A software report would be used to determine what programs are installed on a particular computer.

• Network policy should be used to select network passwords.

• User policies refer to documentation that outlines what is and what is not permissible on the network.

• Configuration error is NOT used as a baseline measure.

Page 4: Chabot College Chapter 8 Review Semester IIIELEC 99.09 Semester III ELEC 99.09

Network Operating SystemsNetwork Operating Systems

• Network operating system (NOS) controls the resources and management of a client-server network.

• The Unix network operating system supports multi-user, multitasking, primarily uses NFS security, and is kernel based.

Page 5: Chabot College Chapter 8 Review Semester IIIELEC 99.09 Semester III ELEC 99.09

Peer-to-Peer NetworksPeer-to-Peer Networks

• The recommended maximum number of users in a peer-to-peer network is 10.

• A dedicated server is NOT associated with a peer-to-peer network.

• A peer-to-peer network is also known as a workgroup network.

Page 6: Chabot College Chapter 8 Review Semester IIIELEC 99.09 Semester III ELEC 99.09

TroubleshootingTroubleshooting

• Network troubleshooting is defined as a systematic process.

• Your first step in the troubleshooting process is to gather data.

• A possible solution to the problem of EMI/RFI effecting performance on your network is using STP cable.

Page 7: Chabot College Chapter 8 Review Semester IIIELEC 99.09 Semester III ELEC 99.09

TroubleshootingTroubleshooting

• The ping 127.0.0.1 command will test the loopback function on the NIC.

• An isolating transformer controls voltage spikes and HF noise.

• A grounding strap reduces the static discharge risks associated with working on the inside of a computer.

Page 8: Chabot College Chapter 8 Review Semester IIIELEC 99.09 Semester III ELEC 99.09

InfectionsInfections

• A worm is a program that spreads across computers and usually reproduces copies of itself in a computer's memory.

• A virus is a program that usually has a negative effect on executable programs.

Page 9: Chabot College Chapter 8 Review Semester IIIELEC 99.09 Semester III ELEC 99.09

Backup and StorageBackup and Storage

• Incremental backup stores all files that have been created and modified since the last full backup.

• Magnetic tape is used to backup data because the tape is inexpensive.

• RAID 5 is a redundancy technique that uses disk striping with parity and requires a minimum of three disks.