What is the main difference between a mainframe and a supercomputer?
Mainframes can do multiple jobs very quickly, while supercomputers can only do one job very quickly.
What is the definition of “Distributed or Open” Systems?
Networks of smaller systems built to interact with one-another to form a Large System.
What is the speed of a mainframe measured in?
MIPS – Millions of Instructions per Second
TRUE/FALSE: Mainframes run scheduled BATCH jobs that run without user input.
True
Short Answer: What are Large Systems?
A collection of multiple smaller systems that together serve a purpose or perform a business function.
Which of the following are components of Large Systems?
Datacenter Management, Network Engineering, Client/Server Engineering, Telephony and Call Routing, IT Security, Messaging and Collaboration, Database Systems
True or False: VPN is NOT a secure connection between networks.
False
TRUE/FALSE: VLAN is a Layer 3 (Network Layer) concept.
False - VLAN is a Layer 2 (Data Link) concept.
Which device operates at layer 3 (the Network Layer) of the OSI model?
The Router
How many layers are there in the OSI model?
7
What are the benefits of layering within a reference model?
Less Complex – breaks concepts into smaller pieces – development of individual protocols for layer-to-layer communication
Standard interfaces – allows for multiple vendors to create products that compete to be used for a give function
Easier to learn – enables us to learn individual protocol specs for each layer
Easier to develop – can develop protocols to do specific tasks as defined for the layer
Multivendor Interoperability – Allows multiple vendors to develop to standard of specs
Modular Engineering – can create solutions to problems at each layer, invoking technology from higher and/or lower layers
What are the 7 layers of the OSI model IN ORDER?
7. Application
6. Presentation
5. Session
4. Transport
3. Network
2. Data Link
1. Physical
At which layer of the OSI model do the Hub, Switch and Router reside?
Hubs – Layer 1
Switches/Bridges – Layer 2
Routers/Firewalls – Layer 3
What is the Definition of the MAC Address?
The MAC Address is the physical address of the machine that is burned onto the machine’s Network Interface Card.
What is the difference between the MAC address of a machine and the IP Address of a machine?
The MAC Address is the burned in address of the machine and is not intended to ever change. The IP Address is a logical address that the machine uses and changes when the machine moves to different networks (For example, moving from building to building). Remember that the MAC address is static and the IP Address is dynamic.
What is NOT one of the minimum requirements for network communication?
IP Address, Subnet Mask, Default Gateway
What is the protocol that dynamically assigns IP addresses to machines on a network?
The Dynamic Host Configuration Protocol
Which protocol is used to resolve HOST NAMES to IP Addresses?
The Domain Name System (DNS)
What are the two main functions of IP – the Internet Protocol?
Route Selection and Logical Addressing
What is the main difference between TCP (Transmission Control Protocol) and UDP (User Datagram Protocol)?
TCP provides reliable delivery while UDP does not
What are the two components of an IP Address?
Network and Host
What mechanism is built into Ethernet to allow it to avoid collisions on the network?
CSMA/CD – Carrier Sense Multiple-Access with Collision Detection
What is one advantage to using IPv6 over IPv4?
IPv6 supports encryption whereas applications provide encryption in IPv4
True or False – A Router separates collision domains whereas a switch separates broadcast domains?
FALSE – (It is the other way around – a router separates broadcast domains whereas a switch separates collision domains)
What was the significance of the release of the Macintosh Computer in 1984?
It was the first commercially successful computer to feature a GUI (Graphical User Interface) and a mouse.
What are the names of some popular LINUX distributions?
Ubuntu, Suse, Red Hat, Mandrake
What is one perceived advantage to running Linux as opposed to Windows?
Linux is more secure and is less likely to be compromised by viruses or malware.
Who Created the Linux Operating System?
Linus Torvalds in 1991
State Moore’s Law:
The number of transistors that can be placed inexpensively on an Integrated Circuit doubles every two years.
Which version of Windows introduced Microsoft’s Active Directory?
Windows 2000
What is one major difference between the UNIX and Windows Operating Systems?
UNIX does a better job of managing users and their processes than does Windows.
True or False – IBM’s OS/2 and Microsoft Windows 95 were the first two major operating systems to be installed independent of MS DOS.
True
True or False – In the event of a Windows System crash, one way to potentially recover files from the damaged system is to boot the machine to either MS DOS or Linux, access the file system of the machine and remove important files.
True
Which of the following is generally considered a security advantage of the Microsoft Windows Vista and Windows 7 Operating Systems?
Bitlocker Support
What does RAID stand for?
Redundant Array of Independent Disks
What is the purpose of using RAID when creating a disk array?
RAID increases performance and (with the exception for RAID 0) provides fault tolerance in the event of a physical disk failure.
Who created the UNIX Operating System and where were they working when they created it?
Ken Thompson and Dennis Ritchie at Bell Labs
What are some Key Characteristics of the Mainframe?
Centralized Processing as opposed to Distributed Processing, Used by multiple users at the same time – true multitasking, Ability to do Multiple jobs very quickly
What is one of the main reasons that the Mainframe has a continued presence in the Business World?
Its ability to solve multiple business problems very quickly with little to no downtime.
What is a main reason that business tend to invest in Client/Server or Distributed systems?
What type of virtualization is commonly used in SANs?
Storage Virtualization
What were the two types of Hypervisors discussed in class?
Bare Metal and Hosted
True or False – A Hypervisor emulates computer hardware, allowing multiple Operating Systems to run on a single physical host.
True
What are two disadvantages of Virtualization?
High Initial Investment, Requires a great deal of redundancy and fault tolerance.
True or False - In Traditional Cloud Computing, the user does NOT own his or her physical infrastructure.
True
What is the advantage of a “Private Cloud” to business?
A private cloud allows a business to invest in the architecture and technologies to provide cloud services within the organization without involving a service provider.
What is “Cloud Computing”?
Cloud computing is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand, like the electricity grid.
The process of using application software to abstract the operating system, applications, and data from the user's PC is referred to as:
Virtualization
True or False? A Virtual Private Network can be used to grant telecommuters or remote users access to a company's network.
True
What is one reason why companies may be slow to adopt virtual environments?
Requires a paradigm shift – It is sometimes difficult to convince people that virtual environments are viable
What is an example of Network Virtualization?
The Virtual LAN or VLAN
What is an inherent risk of running production servers in a Virtual Environment?
If the server that is hosting the Virtual Machines goes down, all machines running on the host Server will be lost as well.
True or False – The SAN is an integral part of a Virtual Server solution because it is through the use of external storage that virtual machines can be moved between physical hosts.
True
What is the definition of a VLAN?
A VLAN is a logical segregation of a network into individual broadcast domains.
What is the Idea of a “Private Cloud” and why is it an important concept?
The idea of a “Private Cloud” is that every piece of data that you might ever need is available at your fingertips from multiple devices (smartphones, laptops, tablets, etc).