Is The Average Time Necessary To Repair A Failure Within The Computer Network.
Chapter 13: Network Design and Management
True/FALSE
1. Calculator network engineering science changes at breakneck speed.
ANS: T PTS: 1
2. The systems development life bicycle is a one-time only process.
ANS: F PTS: 1
3. 1 very of import part of about computer systems today is the network.
ANS: T PTS: 1
4. Not all analysis and blueprint projects require all iii network connectivity maps.
ANS: T PTS: i
5. In a wide expanse connectivity map, a dotted line betwixt two sites indicates a desired path for information (or voice) manual.
ANS: F PTS: i
six. A metropolitan area connectivity map shares some of the characteristics of wide area maps and some of the characteristics of local surface area maps.
ANS: T PTS: ane
7. Latency, delivery rate, and failover are unremarkably pregnant factors that are included at the local area level.
ANS: F PTS: i
8. Analyzing and designing a new reckoner organisation can be time-consuming and expensive.
ANS: T PTS: 1
9. The term "feasible" has several meanings when it's applied to reckoner-based projects.
ANS: T PTS: i
ten. When calculating a figurer organisation benefits, yous do not need to include intangible benefits.
ANS: F PTS: 1
xi. In a payback analysis, the Development Toll and Operation and Maintenance Costs total the costs of the project over its intended lifetime.
ANS: T PTS: one
12. In a payback analysis, the Cumulative Time-Adjusted Benefits are the Benefits multiplied by the present value of a dollar for each year.
ANS: F PTS: 1
13. Estimator networks are mission-critical systems, and designing a new reckoner network or increasing the capacity of a current system requires conscientious planning.
ANS: T PTS: 1
14. Capacity planning is a fairly easy and fast operation.
ANS: F PTS: i
15. Two technologies in computer networking that oft generate revenue are wireless LANs and network security.
ANS: F PTS: ane
16. Calculator simulations are easy to create, mainly because information technology is difficult to make mistakes in the modeling procedure and easy to detect them.
ANS: F PTS: 1
17. Compared to simulation, benchmarking is a relatively straightforward technique and can provide useful information when it's used to analyze a network.
ANS: T PTS: 1
18. Setting upwardly a benchmark test can be quite time-consuming.
ANS: T PTS: 1
19. Many experts experience belittling modeling is a good way to determine network capacity.
ANS: T PTS: 1
20. The advantage of analytical modeling is that it is extremely hard to create inaccurate analytical models and thus generate results that are invalid.
ANS: F PTS: ane
21. In one case a baseline is created, the results can be used to identify network weaknesses and strengths.
ANS: T PTS: 1
22. Baseline studies are most effective when they are initiated during a time when the network is experiencing severe problems.
ANS: F PTS: 1
23. Collecting data on system users involves determining the maximum number of users, the boilerplate number of users, and the peak number of users.
ANS: T PTS: one
24. Assembling information on network applications requires that you create a fairly all-encompassing list of statistics.
ANS: F PTS: 1
25. Considering shared-segment CSMA/CD networks are contention-based, they practise not suffer from collisions.
ANS: F PTS: i
26. It is possible to become certified on a particular blazon of network operating organisation.
ANS: T PTS: 1
27. Although every device is unlike, the shorter the mean time between failures, the better.
ANS: F PTS: ane
28. A component or network with a high availability (near 1.0) is nigh always operational.
ANS: T PTS: 1
29. A reliability of exactly one.0 means the network or device is reliable one percent of the time.
ANS: F PTS: 1
30. A very popular sniffer that tin can be used on Unix and Windows networks is Ethereal/Wireshark.
ANS: T PTS: i
MULTIPLE CHOICE
i. 1 of the most popular and successful plans currently used past businesses today is the ____.
a. | network cycle | c. | systems evolution life cycle (SDLC) |
b. | software-network cycle | d. | distributed bike |
ANS: C PTS: i
2. In general, a ____ approach is a serial of steps and tasks that professionals, such as systems developers, tin can follow to build high-quality systems faster, with fewer risks, and at lower costs.
a. | structured | c. | linear |
b. | random | d. | quadratic |
ANS: A PTS: 1
iii. The intent of SDLC is for ____ non to exist disjointed steps in a big program, just overlapping layers of activity.
a. | cycles | c. | rounds |
b. | phases | d. | levels |
ANS: B PTS: 1
4. 1 technique used to model a corporation's network environment is to create ____.
a. | link shadows | c. | dots model |
b. | node approaches | d. | connectivity maps |
ANS: D PTS: 1
5. Three different modeling techniques can be used: ____ expanse connectivity maps, metropolitan area connectivity maps, and local area connectivity maps.
a. | personal | c. | world |
b. | broad | d. | universal |
ANS: B PTS: one
6. In a wide area connectivity map, mobile or wireless sites are indicated by circles containing the letter ____.
a. | A | c. | M |
b. | E | d. | X |
ANS: C PTS: 1
7. In a wide expanse connectivity map, external sites, such as suppliers or external agents, are denoted past circles containing the letter of the alphabet ____.
a. | Due east | c. | M |
b. | F | d. | X |
ANS: A PTS: 1
8. A new parameter that might have an impact on metropolitan area design is the ____.
a. | link shadow | c. | link length |
b. | node altitude | d. | failover time |
ANS: D PTS: 1
9. To examine the nodes in a broad area connectivity map in more particular, an annotator can expand each individual site into a ____ area connectivity map.
a. | personal | c. | world |
b. | local | d. | universal |
ANS: B PTS: one
x. A ____ map tin bear witness how individual workstations or groups of workstations are clustered with switches, routers, hubs, and server farms.
a. | local area detailed connectivity | c. | metropolitan area connectivity |
b. | local area overview connectivity | d. | wide area connectivity |
ANS: A PTS: i
11. A system's ____ feasibility is the extent to which the organisation can be created, given the company'due south current finances.
a. | technical | c. | financial |
b. | operational | d. | time |
ANS: C PTS: i
12. When a company is evaluating a project'due south ____ feasibility, the company must enquire: Volition the proposed system produce the expected results?
a. | financial | c. | fourth dimension |
b. | technical | d. | operational |
ANS: D PTS: one
thirteen. When a company is evaluating a project's ____ feasibility, the company must inquire: Tin can the proposed system be designed, built, tested, and installed in an amount of time that all parties find reasonable and to which they can concord?
a. | fiscal | c. | time |
b. | technical | d. | operational |
ANS: C PTS: 1
14. ____ analysis is a mutual financial analysis technique that involves determining a proposed arrangement's costs and benefits.
a. | Payback | c. | Operational |
b. | Time | d. | Technical |
ANS: A PTS: 1
fifteen. With respect to ____ benefits, the most common measurement is the monthly or annual savings that will event from the employ of the proposed system.
a. | intangible | c. | imaginary |
b. | tangible | d. | projected |
ANS: B PTS: 1
xvi. ____ benefits are ones for which assigning a dollar amount is difficult; they include customer goodwill and employee morale.
a. | Tangible | c. | Real |
b. | Concrete | d. | Intangible |
ANS: D PTS: i
17. When performing a payback analysis adding, you should show all dollar amounts using the ____.
a. | fourth dimension value of money | c. | computer simulation |
b. | money value of time | d. | benchmarking |
ANS: A PTS: 1
xviii. ____ means that if something is going to cost one dollar one year from now, you demand to put abroad less than a dollar today to pay for information technology.
a. | Operational feasibility | c. | Technical feasibility |
b. | The coin value of time | d. | The time value of money |
ANS: D PTS: one
19. In a payback analysis, the ____ Cost is a ane-time cost that occurs in Year 0.
a. | Performance and Maintenance | c. | Time-Adjusted |
b. | Development | d. | Cumulative Time-Adjusted |
ANS: B PTS: ane
20. In a payback analysis, the ____ Costs are but the running sums of the Time-Adjusted Costs over all the years.
a. | Operation and Maintenance | c. | Cumulative Time-Adjusted |
b. | Development | d. | Time-Adjusted |
ANS: C PTS: 1
21. In a payback assay, the ____ values are the running sums of the Time-Adjusted Benefits over all the years.
a. | Time-Adjusted Benefits | c. | Cumulative Fourth dimension-Adjusted Costs |
b. | Cumulative Time-Adjusted Benefits | d. | Time-Adapted Costs |
ANS: B PTS: one
22. In a payback analysis, the ____ Costs are the Cumulative Time-Adjusted Costs plus the Cumulative Fourth dimension-Adapted Benefits for each year.
a. | Time-Adjusted Benefits | c. | Cumulative Lifetime Fourth dimension-Adjusted |
b. | Performance and Maintenance | d. | Time-Adjusted Costs |
ANS: C PTS: 1
23. Payback assay helps y'all determine the estimate time for a project'southward payback, or ____, to occur.
a. | cumulative lifetime | c. | disbelieve factor |
b. | benefits derived | d. | return on investment (ROI) |
ANS: D PTS: 1
24. When a visitor calculates the ____ for a proposed project, it compares the revenue generated from the project with the expenses incurred.
a. | ROI (return on investment) | c. | operational feasibility |
b. | technical feasibility | d. | time feasibility |
ANS: A PTS: ane
25. A number of techniques exist for performing ____ planning, including linear projection, computer simulation, benchmarking, and analytical modeling.
a. | financial | c. | capacity |
b. | time | d. | money |
ANS: C PTS: 1
26. The reward of using a ____ is that it can mimic atmospheric condition that would be extremely difficult, if not impossible, to create on a real network.
a. | calculator simulation | c. | time project |
b. | linear projection | d. | benchmark |
ANS: A PTS: 1
27. ____ involves generating organization statistics nether a controlled environment and so comparing those statistics confronting known measurements.
a. | Linear projection | c. | Computer simulation |
b. | Benchmarking | d. | Analytical modeling |
ANS: B PTS: 1
28. ____ involves the creation of mathematical equations to calculate various network values.
a. | Linear project | c. | Computer simulation |
b. | Benchmarking | d. | Analytical modeling |
ANS: D PTS: i
29. One of the best techniques for determining electric current network capacities is creating a ____.
a. | baseline | c. | return of investment (ROI) |
b. | payback analysis | d. | topline |
ANS: A PTS: 1
30. Network personnel create a ____ to make up one's mind the normal and current operating conditions of the network.
a. | linear projection | c. | timeline |
b. | computer project | d. | baseline |
ANS: D PTS: 1
31. To collect baseline information on ____, you lot create a listing of the number and types of system nodes in the network.
a. | operational protocol | c. | system nodes |
b. | organization users | d. | network application |
ANS: C PTS: one
32. Collecting baseline data on ____ involves listing the types of operational protocols used throughout the system.
a. | system users | c. | network application |
b. | operational protocols | d. | arrangement nodes |
ANS: B PTS: 1
33. Typically, a network reaches saturation when its network utilization is at ____ per centum.
a. | 55 | c. | 80 |
b. | threescore | d. | 100 |
ANS: D PTS: 1
34. To learn new skills and demonstrate proficiency within a particular area, the network administrator can obtain ____.
a. | certification | c. | ROI |
b. | policies | d. | capacity planning |
ANS: A PTS: 1
35. Four statistics, or measures, that are useful in evaluating networks are mean time between failures, mean time to repair, ____, and reliability.
a. | payback | c. | availability |
b. | integrity | d. | ROI |
ANS: C PTS: one
36. The ____ includes the time needed to bring the system support to normal functioning.
a. | mean time between failures | c. | availability |
b. | mean fourth dimension to repair | d. | reliability |
ANS: B PTS: i
37. A protocol analyzer is as well known as ____.
a. | cable tester | c. | simulator |
b. | catcher | d. | sniffer |
ANS: D PTS: i
38. ____ is an industry standard created by the Cyberspace Engineering Chore Force and designed originally to manage Internet components.
a. | Simple Post Transfer Protocol (SMTP) |
b. | Cyberspace Control Bulletin Protocol (ICMP) |
c. | Elementary Network Management Protocol (SNMP) |
d. | Transport Control Protocol (TCP) |
ANS: C PTS: 1
39. The ____ software controls the operations of a managed chemical element and maintains a database of data about all managed elements.
a. | SNMP agent | c. | SMTP manager |
b. | SNMP director | d. | SMTP amanuensis |
ANS: B PTS: one
40. ____ is a protocol that allows a network administrator to monitor, analyze, and troubleshoot a group of remotely managed elements.
a. | Remote Network Monitoring (RMON) |
b. | Unproblematic Mail Transfer Protocol (SMTP) |
c. | Remote Login (rlogin) |
d. | File Transfer Protocol (FTP) |
ANS: A PTS: i
COMPLETION
one. The ________________________________________ is a structured arroyo to the development of a business system.
ANS:
systems development life bike (SDLC)
systems evolution life wheel
SDLC
PTS: 1
2. A professional person chosen a(n) ____________________ typically is responsible for managing a projection and post-obit the SDLC phases.
ANS: systems annotator
PTS: 1
3. In order to create a(north) ____________________ connectivity map, the modeler begins by identifying each site or location in which the company has an office.
ANS: wide surface area
PTS: one
4. If a company desires a metropolitan surface area network connection between one of its offices and another business, it can use a(northward) ____________________ connectivity map to outline this connectedness and define the desired network characteristics.
ANS: metropolitan area
PTS: 1
v. ____________________ is the amount of time necessary for the metropolitan expanse network to reconfigure itself or reroute a bundle, should a given link fail.
ANS: Failover fourth dimension
PTS: one
vi. If merely an overview of a local network is desired, and so the analyst can create a(n) ____________________ connectivity map.
ANS: local surface area overview
PTS: 1
vii. The ____________________ feasibility of a arrangement is the extent to which the arrangement can be created and implemented using currently existing technology.
ANS: technical
PTS: i
8. When a system demonstrates ____________________ feasibility, information technology operates as designed and implemented.
ANS: operational
PTS: 1
9. A arrangement'south ____________________ feasibility is the extent to which the system can be installed in a timely fashion and meets organizational needs.
ANS: time
PTS: 1
10. ____________________ charts the initial costs and yearly recurring costs of a proposed system against the projected yearly income (benefits) derived from the proposed organization.
ANS: Payback analysis
PTS: ane
11. The ____________________ is a concept that states that one dollar today is worth more than 1 dollar promised a year from now.
ANS: fourth dimension value of money
PTS: 1
12. In a payback analysis, the ____________________ row reflects the total costs for each year times the present value of a dollar for that year.
ANS: Fourth dimension-Adjusted Costs
PTS: 1
thirteen. In a payback analysis, the ____________________ values are the benefits, or income amounts, that are expected each year.
ANS: Benefits Derived
PTS: 1
xiv. ____________________ involves trying to determine the corporeality of network bandwidth necessary to support an awarding or a prepare of applications.
ANS: Capacity planning
PTS: 1
15. ____________________ involves predicting one or more network capacities based on the current network parameters and multiplying those capacities by some constant.
ANS: Linear project
PTS: 1
16. A(northward) ____________________ involves modeling an existing system or a proposed system using a estimator-based simulation tool and subjecting the model to varying degrees of user demand (called load).
ANS: figurer simulation
PTS: 1
17. Creating a(northward) ____________________ for an existing computer network involves measuring and recording a network'south state of performance over a given catamenia of time.
ANS: baseline
PTS: i
xviii. ___________________________________ is the average time a device or system volition operate before it will fail.
ANS:
Mean time between failures (MTBF)
Mean time betwixt failures
MTBF
PTS: ane
19. ______________________________ is the average time necessary to repair a failure within the computer network.
ANS:
Mean time to repair (MTTR)
Mean time to repair
MTTR
PTS: 1
20. ____________________ is the probability that a particular component or system will be available during a fixed time period.
ANS: Availability
PTS: 1
21. ____________________ calculates the probability that a component or arrangement will exist operational for the duration of a transaction of time t.
ANS: Reliability
PTS: i
22. A(n) ____________________ monitors a network 24 hours a twenty-four hours, 7 days a week, and captures and records all transmitted packets.
ANS:
protocol analyzer
sniffer
PTS: 1
23. A(due north) ______________________________ facilitates the commutation of management information between network devices.
ANS: network management protocol
PTS: 1
24. A managed chemical element has management software, called a(due north) ____________________, running in it.
ANS: agent
PTS: 1
25. The database that holds the data about all managed devices is called the ____________________________________.
ANS:
Management Information Base (MIB)
Management Data Base
MIB
PTS: 1
ESSAY
i. Mention some of the major goals every visitor has.
ANS:
Every visitor, whether it's a for-turn a profit or nonprofit organization, usually has a number of major goals, some of which may include:
* Increasing the company's customer base
* Keeping customers happy by providing the visitor'southward services as well every bit possible
* Increasing the visitor's profit level, or, in a nonprofit organization, acquiring the funds necessary to meet the system's goals and objectives
* Conducting business more than efficiently and effectively
From these major goals, systems planners and management personnel within a company try to generate a set of questions that, when satisfactorily answered, will help their organization in achieving its goals and motion the organization forward. For case, someone in management might ask: Is at that place a way to streamline the order organization to allow the company to acquit business organization more efficiently and finer? Can we automate the customer renewal organisation, to better serve customers and go along them happy? Is there a more efficient way to offer new products to assist the company increase the client base of operations? Is in that location a better way to manage our warehouse organisation to increase company profits?
PTS: 1
2. What are the SDLC phases?
ANS:
Although virtually every company that uses SDLC and every textbook that teaches SDLC has its own slightly different variation of the methodology, about agree that the SDLC includes the following phases:
* Planning—Identify problems, opportunities, and objectives.
* Analysis—Decide data requirements, clarify system needs, and prepare a written systems proposal.
* Design—Design and build the system recommended at the end of the assay stage and create the documentation to back-trail the organisation.
* Implementation—Install the system and ready to movement from the old organization to the new system; railroad train the users.
* Maintenance—Correct and update the installed arrangement as necessary.
PTS: ane
iii. How do yous determine the cost of a organisation?
ANS:
To determine the cost of a system, it is necessary to include all possible costs. To do this, you volition first demand to consider all one-time costs such as:
* Personnel costs related to those individuals specifically hired to work on developing the arrangement; these may include the salaries of analysts, designers, programmers, consultants, specialists, operators, secretaries, and and so on
* Computer usage costs, which reflect the computing needed to perform the analysis and feasibility studies
* Costs of hardware and software for the proposed system
* Costs to train the users, support personnel, and management to use the proposed arrangement
* Supplies, duplication, and furniture costs for the personnel creating the proposed arrangement
Merely to get a comprehensive understanding of the cost of the organization, you must too calculate the recurring costs of the proposed arrangement. These include:
* Lease payments on computer hardware or other equipment
* Recurring license costs for software purchased
* Salaries and wages of personnel who will back up the system
* Ongoing supplies that will go along the proposed system working
* Heating, cooling, and electrical costs to back up the proposed system
* Planned replacement costs to supplant pieces of the system as they fail or get obsolete
PTS: i
4. Provide an case of capacity planning using linear projection.
ANS:
For an example of capacity planning—using a linear projection—suppose you lot piece of work for a company that allows its employees to access the Internet. Informal studies performed in the belatedly 1990s showed that the average Internet user requires a transmission link of l kbps. As a precaution, let's double that figure to 100 kbps to allow room for growth. Additional studies have shown that the meridian 60 minutes for Cyberspace access is around 11:00 a.m., at which fourth dimension about 40 percentage of the potential users are on the system. If your arrangement has 1000 potential users, your pinnacle capacity would correspond to 400 concurrent users, each of whom requires a 100-kbps connexion. To satisfy this need, network capacity would need to be 40 Mbps (400 ten 100 kbps). Can your local area network back up this much traffic? In this example, chapters planning indicates that if your company is non willing to install communications links totaling 40 Mbps, it may accept to apply restrictions on how its employees use the Internet. For instance, the company may accept to limit the number of simultaneous users or not requite the full 100-kbps capacity to each user. Alternatively, the company tin can just hope that no more than twoscore per centum of all its users will admission the Internet at the aforementioned moment in time.
PTS: ane
5. What are the skills needed by a network administrator?
ANS:
Considering many network administrators are dealing with both computers and people, they need the skills necessary to work with both. A checklist of skills for the network ambassador would include a wide platform of technology skills, including, but not limited to, knowledge of local expanse networks, wide area networks, voice telecommunication systems, data transmission systems, video transmission, bones hardware concepts, and basic software skills. A network administrator should also have interpersonal skills, including the ability to talk to users in order to service problems and explore new applications. Along with interpersonal skills, a network administrator also needs preparation skills, which involve the ability to train users or other network back up personnel.
To make effective use of express resources, a network ambassador should too possess a number of common management skills. For i, the network ambassador should accept budget direction skills, which include knowing how to set a upkeep to justify continuing funds or to asking additional funds. Along with those skills, a network ambassador needs basic statistical skills, which ways that he or she must know how to collect and apply organisation statistics to justify the performance of existing systems or to validate the improver of new ones. Fourth dimension management skills are also a necessity. These include the ability to manage not merely ane's ain time, only likewise that of projects and any information technology workers who may be working for the administrator. Just equally valuable as time direction skills are project management skills, which center on the ability to proceed a project on schedule and to use project-estimating tools, projection-scheduling tools, and other methods for continuous project assessment. Finally, a network administrator should possess policy cosmos and enforcement skills, which include the ability to create policies concerning the use of the computer systems, access to facilities, countersign protection, access to applications, access to databases, distribution of hardware and software, replacement of hardware and software, and the handling of service requests.
PTS: 1
© 2022 Cengage Learning. All Rights Reserved. This edition is intended for utilise exterior of the U.S. only, with content that may exist different from the U.Due south. Edition. May non be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
Share with your friends:
Is The Average Time Necessary To Repair A Failure Within The Computer Network.,
Source: https://sckool.org/chapter-13-network-design-and-management-truefalse.html
Posted by: kellyjonan2002.blogspot.com
0 Response to "Is The Average Time Necessary To Repair A Failure Within The Computer Network."
Post a Comment