Free

CIS206 U3 Discussion - Coursework Example

Comments (0) Cite this document
Summary
It also concerns the ability of the filesystem to be increased or reduced and limitations that come with it (Basta, 2013). We also consider its compatibility with a majority of the other…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.8% of users find it useful
CIS206 U3 Discussion
Read TextPreview

Extract of sample "CIS206 U3 Discussion"

Filesystems in Linux and Windows Insert Insert Reasons that will make you choose one filesystem over another typically? The reasons for choosing one filesystem over another include read and write capabilities. It also concerns the ability of the filesystem to be increased or reduced and limitations that come with it (Basta, 2013). We also consider its compatibility with a majority of the other filesystems. It is also vital to consider the length of its fsck which determines whether it’s or not journalized.
What Windows file systems do you typically use and why?
I use exFAT filesystem because it saves me the time of having to format the drive when shifting from the two operating systems I use i.e. mac and windows. The reason for this is NTFS happens to be read only on Mac while Mac formatted drives cannot be in Windows.
How does this compare to Linux filesystems?
Windows is made up of FAT and NTFS filesystems whereas Linux has a variety of files systems most that you can boot from the network. Its not easy to run out of memory in Linux because it has swap partition that is different from the partition containing data. The latter is not the case in Windows (Carpenter, 2012). In addition, Linux filesystems have a lot of recovery tools as compared to windows.
Evaluate two Linux filesystems and make a recommendation for why an administrator may choose one Linux filesystem over another?
There are many file systems in Linux including xfs, ext3, ext4, ext2, and jfs. These filesystems have different advantages and disadvantages thus the preference of one over the other. XFS has its data layout the same way it is in ext2, ext3, and ext4. However, it has a journal and consequently increments btree management of meta-data. The latter case leads to poor performance especially when in managing meta-data in files and directories. A positive outcome is read enactment. XFS also has an excellent performance when handling read and write at the same time.
It is one of the filesystems that has been tested and fine-tuned over a long period. Further, it has incredible features that include xfs_fsr a defragmenter that is very simple to use (Hudson & Hudson, 2006). However, it is only possible to increase the size of the XFS but its not feasible to reduce that size. Thus as a precaution it is advisable to start with a smaller size.
Ext4 evolves from ext3. It has the advantage of writing in a journal before updating the file system. It has made it good in recovering from crashes. It also adds wonderful management to adjacent data in files. Its performance in reading is good. Since it is very recent, a lot of tests are still underway.
Discuss some of the reasons why you feel an administrator might impose a disk quota system on a Linux server. Challenges of implementing a general quota upon all corporate users?
An administrator imposes a disk quota system on a Linux server so as to distribute the disk space among the users or groups according to their usage needs. It is also important in determining the number of directories and files that the administrator can create. Further, it also enables them to set a point of warning to its users that they are closing in on the disk limit allocated to them.
The disadvantage of implementing a general quota for all corporate users is risking the loss of data. The scenario happens when quota software scans the disk regularly to determine disk usage. Users encounter this after exceeding their quota and may be forced to change to a program managing the file system so as to delete till they have space. Thus, users need tutoring on how to handle this.
References
Basta, A. (2013). Linux operations and administration. Boston: Course Technology/Cengage Learning.
Carpenter, T. (2012). Microsoft Windows operating system essentials. Indianapolis, Ind.: John Wiley & Sons.
Hudson, A., & Hudson, P. (2006). Red Hat Fedora 5 Linux Unleashed. Indianapolis, Ind.: Sams. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“CIS206 U3 Discussion Coursework Example | Topics and Well Written Essays - 250 words”, n.d.)
CIS206 U3 Discussion Coursework Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1683274-cis206-u3-discussion
(CIS206 U3 Discussion Coursework Example | Topics and Well Written Essays - 250 Words)
CIS206 U3 Discussion Coursework Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1683274-cis206-u3-discussion.
“CIS206 U3 Discussion Coursework Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1683274-cis206-u3-discussion.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF CIS206 U3 Discussion

Congress U3

...?Congress U3 Introduction Separation of powers as per the U.S. Constitution gives Congress an important position as a branch of government due to it being representative of the various opinions and aspirations of the citizens of the country. This position of the U.S. Congress makes it an important and integral part of the agenda of any U.S. President, with the potential to make or break it. (1). The Congress and Obama’s Agenda The powers in a war situation clearly of the President and the Congress demonstrate the separation of powers between these two branches of government. According to the U.S. Constitution the Congress retains the power to declare was and through its control of the purse strings can bring about a...
1 Pages(250 words)Essay

MGMT499 U3 DB

... Employee Grading Form of the Employee…………. Department……………………… of the Reviewer………….. Date of Review…………………. Leadership Skills Excellent (3pts) Good(2pts) Fair (1pt) Poor (0pt) Honesty Communication Skills Confidence Commitment Cooperation Interpersonal Skills Excellent (3pts) Good(2pts) Fair (1pt) Poor (0pt) Creative Thinking Diversity Encouraging Empathy Flexibility Earned Values Excellent (3pts) Good(2pts) Fair (1pt) Poor (0pt) Initiative Punctuality Work Consistency Creativity Work Quality Using the grading form displayed above, James Anderson, a supervisor with one of the companies that worked for in the past can be classified as having excellent interpersonal skills, earned values and leadership skills. On the earned values...
1 Pages(250 words)Research Paper

U3 Discussion

...AD Domain Part one A strategically designed Active Directory Group assists simplify administration and attain greatest flexibility. Nevertheless, configuring groups and assigning various group attributes is a multifaceted process that engages several steps when performed using native Active Directory tools, PowerShell, To limit this dilemma and make Group Management easier, ADManager Plus streamlines all these people’s tasks and aid one to manage groups from a centralized web console. ADManager Plus has an exclusive characteristic dedicated for Group Management that make things easier creating and managing Security and Distribution Groups in Active Directory. One can include or remove numerous group members, define various... Domain Part one...
1 Pages(250 words)Coursework

U3 Lab Reprort

...Networking Lab Activities Networking This paper seeks to illustrate the objectives of lab activities that were done during the semester and their application in the career that awaits ahead. First, it is worthy to note that these lab activities are purely networking labs. This is because they deal with various aspects routing concepts and network configurations. The main objective of these lab activities is the expose the participants to how various networking concepts have over the years been used to integrate different kinds of technologies in order to enable information exchange. Great technological advancements have been made within the last decade. One area that has been greatly impacted by these advancements... Lab Activities Networking ...
1 Pages(250 words)Lab Report

CIS206 U5 Research Assignment

...Administering a UNIX User Environment Administering a UNIX User Environment The article, Unix Administration, by David Malone focuses on various aspects that involve the administration of the UNIX user environment. It starts by outlining the duties of an administrator that generally involve ensuring the system functions as intended. Although the tasks of administrators vary depending on the environment, they are expected to add or remove users, hardware, and software. They also perform backups, documentation, auditing and troubleshooting of security features, and helping users (Malone 2011). The administrator accomplishes the tasks mentioned above by using basic UNIX objects. Some of these basic UNIX objects are such as files... a UNIX User ...
1 Pages(250 words)Essay

CIS206 Review Assignment

...is suitable to open a particular file. The latter is established based on the extension of the name of the file (Sobell, 2012). Further, choose by right-clicking on the item concerned and selecting open with thus listing programs available for you to choose. c) What are the three common Nautilus control bars? Which kinds of tools do you find on each? The standard control bars include the menu bar, sidebar and main toolbar. The menu bar has a list of menus which in turn have a drop down menu. The menus contained within include file edit, view, and history. The he other hand expands display information contained the view pane thus appearing the views and places. d) Discuss the use of the Nautilus location bar in textual...
1 Pages(250 words)Essay

CIS206 Linux question

...Linux Administrators need for Scripts Insert Insert Administrators in Linux systems need scripts when they find themselves in a situation where they have to do the same thing repeatedly. That will ensure that they spend less time doing the same thing with scripts that have been put to test in the past. The scripts are also easier to use thus saves the administrator a lot of time. Further, they automate the administrator’s task of monitoring the system with less effort. They also offer debugging in a very interactive manner (Lewis, 2013). The latter relates to the notion of the quick start. It is a vital tool for managing many users and monitoring the entire system in general. Using scripts also plays a crucial role when you want...
1 Pages(250 words)Essay

CIS212 U3 Discussion

...How Users Access and Logon to Systems Access control tools are concerned with determining the allowed activities of legitimate users, mediating between every attempt by a user to access a particular resource in the system. Its main objective is to make sure that undesired users do not get access to certain information; only those who are allowed can access. Role-based access control and Discretionary Access Control both are based on defining the roles and adding each user to the system. Authorization and privileges are granted. The main difference between these two user control assets is that RBAC has ease of management while DAC is complicated since each new user has to go through all the details the user needs access to and add... Users...
1 Pages(250 words)Essay

U3 Discussion

...Using Certificates Online Insert Insert One of the advantages of using certificates is that it ensures that only the intended recipients read any data sent online. How does it actually ensure that the intended recipient only reads the data? The consideration in our case is one of SSL operating over TCP. In that implementation, protocols such as HTTP that are on higher layers remain unchanged but still provide a very safe connection. The process will involve establishing a TCP connection from the client to the server via SSL handshake (Quillen, 2012). In building the connect, the client makes some specifications like the SSL running, the cipher suites it intends to use and compression methods of choice. The server confirms... Certificates...
1 Pages(250 words)Essay

CIS256 U3 Discussion

...Domain Service Insert Insert Domain Service is a service geared to convert words that can be physically read by the human being into IP addresses (Dettmer, 2003). These names represent the names of particular hosts. When the domain name is said to be fully qualified, it means that the hostname is a summation of the hostname and the domain name. For instance, gendersoft.domain.com. I would prefer Microsoft domain name service as compared to BIND DNS. The reasons for this include the centrality of access to the role as a part of the Windows server package (Minasi, 2014). It has a feature to allow it for configuration to suit both the recursive, authoritative and hybrid modes. Further, it has a DNS zone file that facilitates... Service Insert...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Coursework on topic CIS206 U3 Discussion for FREE!

Contact Us