Chabot College - PowerPoint PPT Presentation

yosefu
chabot college n.
Skip this Video
Loading SlideShow in 5 Seconds..
Chabot College PowerPoint Presentation
Download Presentation
Chabot College

play fullscreen
1 / 9
Download Presentation
161 Views
Download Presentation

Chabot College

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Chabot College Chapter 8 Review Semester IIIELEC 99.09

  2. Documentation • Documentation is the most critical component of good network administration. • Documentation is the least implemented component of network administration. • A maintenance record is used to keep a list of equipment repairs. • Rack mount location is included in MDF and IDF documentation. • Software listings would NOT be found on security documentation.

  3. Documentation • A software report would be used to determine what programs are installed on a particular computer. • Network policy should be used to select network passwords. • User policies refer to documentation that outlines what is and what is not permissible on the network. • Configuration error is NOT used as a baseline measure.

  4. Network Operating Systems • Network operating system (NOS) controls the resources and management of a client-server network. • The Unix network operating system supports multi-user, multitasking, primarily uses NFS security, and is kernel based.

  5. Peer-to-Peer Networks • The recommended maximum number of users in a peer-to-peer network is 10. • A dedicated server is NOT associated with a peer-to-peer network. • A peer-to-peer network is also known as a workgroup network.


  6. Troubleshooting • Network troubleshooting is defined as a systematic process. • Your first step in the troubleshooting process is to gather data. • A possible solution to the problem of EMI/RFI effecting performance on your network is using STP cable.

  7. Troubleshooting • The ping 127.0.0.1 command will test the loopback function on the NIC. • An isolating transformer controls voltage spikes and HF noise. • A grounding strap reduces the static discharge risks associated with working on the inside of a computer.

  8. Infections • A worm is a program that spreads across computers and usually reproduces copies of itself in a computer's memory. • A virus is a program that usually has a negative effect on executable programs.

  9. Backup and Storage • Incremental backup stores all files that have been created and modified since the last full backup. • Magnetic tape is used to backup data because the tape is inexpensive. • RAID 5 is a redundancy technique that uses disk striping with parity and requires a minimum of three disks.