1. Chapter 9. Question 1
Answer the two video case study questions for this assignment. Use an MS Word document with your name, the module number, and title of the assignment on the page. Your answers must be 300-500 words in length, in paragraph form, grammatically sound, and free of spelling errors.
2. Chapter 9. Question 21
Describe the differences between CSMA/CD and CSMA/CA. Provide one real
life example where CSMA/CD is used. Provide one real life example where
CSMA/CA is used.
3. Chapter 10. Question 4
Several levels of file access were discussed in this chapter, including read/
write, read-only, execute-only, and no access. Assume you maintain a
database containing confidential patient information and need to restrict
UPDATE to only 5 individuals, allow only 15 others to view the database,
and disallow any database access to all other users. Which access level would
you assign to the 20 individuals in the first two groups and to the remaining
users? For each of the three groups, describe every type of access granted to
4. Chapter 10. Question 8
Deadlocks are discussed in Chapter 5. Describe how a DO/S Processor
Manager could attempt to avoid them in a real-life network. Then describe
how it could try to recover gracefully if one should occur.
5. Chapter 10. Question 14
Describe the top 10 critical duties of a network administrator for a distributed
operating system. Identify which level of access would be needed by the
administrator for each duty and explain why.
6. Chapter 11. Question 1
Imagine that you are the manager of a small business computing center. List at
least three techniques that you would use to convince a busy, reluctant night
operator to perform regular backups. Explain the best and worst possible
technique to assure your success.
7. Chapter 11. Question 4
Describe the advantages and disadvantages of password generator software.
Would you recommend the use of such software for your own system? Explain
why or why not.
8. Chapter 11. Question 7
Given multi-network access, it’s not unusual for users to have multiple
user identifications and passwords. How would you manage these multi-
password situations? Describe both the advantages and disadvantages of
9. Chapter 12. Question 6
Review the system with one CPU and four drives below:
• CPU W = 4 ms (the average time to execute 1,000 instructions)
• Drive A = 45 ms (average data access speed)
• Drive B = 3 ms (average data access speed)
• Drive C = 17 ms (average data access speed)
• Drive D = 10 ms (average data access speed)
Calculate I/O access speed using this CPU and each of the four disk drives as
they evaluate the following track requests in this order: 0, 31, 20, 15, 20, 31, 15.
Then, in each case, calculate the access speeds after the track requests are
reordered and rank the four disk drives before and after reordering.
10. Chapter 12. Question 11
Calculate the reliability of a hard disk drive with an MTBF of 2,499 hours
during the last 40 hours of this month. Assume e = 2.71828 and use the
Reliability(t) =e -(1/MTBF)(t)
6 years ago