SNMR Ia2 Ab PDF
SNMR Ia2 Ab PDF
SNMR Ia2 Ab PDF
Scenarios that could potentially cause losses to the business are identified.
These can include supplier’s not delivering, delays in service, etc. The list of
possibilities is long, but it’s key to explore them thoroughly in order to best
assess risk. It is by identifying and evaluating these potential risk scenarios that
a business can come up with a plan of investment for recovery and mitigation
strategies, along with outright prevention.
11. Difference between Block level virtualization and File level virtualization.
Virtualisation on block level means that storage capacity is made available to
the operating system or the applications in the form of virtual disks
In virtualisation on block level the task of file system management is the
responsibility of the operating system or the applications
The task of the virtualisation entity is to map these virtual blocks to the
physical blocks of the real storage devices
Virtualisation on file level means that the virtualisation entity provides virtual
storage to the operating systems or applications in the form of files and
directories
The applications work with files instead of blocks and the conversion of the
files to virtual blocks is performed by the virtualisation entity itself(This means,
the task of file system management is performed by the virtualisation entity,
unlike in block level which is done by OS or application )
The physical blocks are presented in the form of a virtual file system and not in
the form of virtual blocks.
12. Document Surrogate.
The most common way to show results for a query is to list information about
documents in order of their computed relevance to the query.
Alternatively, for pure Boolean ranking, documents are listed according to a
metadata attribute, such as date.
Typically the document list consists of the document's title and a subset of
important metadata, such as date, source, and length of the article.
In systems with statistical ranking, a numerical score or percentage is also
often shown alongside the title, where the score indicates a computed degree
of match or probability of relevance.
This kind of information is sometimes referred to as a document surrogate.
13. Explain SCSI client server model.
SCSI-3 Client-Server Model
SCSI-3 architecture derives its base from the client-server relationship, in
which a client directs a service request to a server, which then fulfills the
client’s request. In a SCSI environment, an initiator-target concept
represents the client-server model. In a SCSI-3 client-server model, a
particular SCSI device acts as a SCSI target device, a SCSI initiator device,
or a SCSI target/initiator device.
Each device performs the following functions:
1. SCSI initiator device: Issues a command to the SCSI target device, to
perform a task. A SCSI host adaptor is an example of an initiator.
2. SCSI target device: Executes commands to perform the task received
from a SCSI initiator. Typically a SCSI peripheral device acts as a target
device. However, in certain implementations, the host adaptor can also
be a target device.
Following Figure displays the SCSI-3 client-server model, in which a SCSI
initiator, or a client, sends a request to a SCSI target, or a server. The
target performs the tasks requested and sends the output to the
initiator, using the protocol service interface.
A SCSI target device contains one or more logical units. A logical unit is
an object that implements one of the device functional models as
described in the SCSI command standards. The logical unit processes the
commands sent by a SCSI initiator. A logical unit has two components, a
device server and a task manager, as shown in Figure 5-4. The device
server addresses client requests, and the task manager performs
management functions.
14. What is Stemming? Explain with example.
15. What is Multi-Linguistic Retrieval System?
16. BC terminologies.
17. Explain pyramid model of information system.