- Imagine that you are the manager of a small business computing center. List at least three techniques that you would use to convince a busy, reluctant night operator to perform regular backups. Explain the best and worst possible technique to assure your success.
- Describe the advantages and disadvantages of password generator software. Would you recommend the use of such software for your own system? Explain why or why not.
Given multi-network access, it's not unusual for users to have multiple user identifications and passwords. How would you manage these multi-password situations? Describe both the advantages and disadvantages of your solution.
Review the system with one CPU and four drives below:
• CPU W = 4 ms (the average time to execute 1,000 instructions)
• Drive A = 45 ms (average data access speed)
• Drive B = 3 ms (average data access speed)
• Drive C = 17 ms (average data access speed)
• Drive D = 10 ms (average data access speed)
- Calculate I/O access speed using this CPU and each of the four disk drives as they evaluate the following track requests in this order: 0, 31, 20, 15, 20, 31, 15. Then, in each case, calculate the access speeds after the track requests are reordered and rank the four disk drives before and after reordering.
- Calculate the reliability of a hard disk drive with an MTBF of 2,499 hours during the last 40 hours of this month. Assume e = 2.71828and use the formula:Reliability (t) =e -(1/MTBF)(t)