IT Questions and Answers :)

Thursday, April 19, 2018

In Windows, What does the "ping -a" command allow you to find out about an IP address?

In Windows, What does the "ping -a" command allow you to find out about an IP address?

  • Router address of the host
  • IP address of the host
  • Resolve the host name
  • Default gateway of the host 

 
In Windows, What does the "ping -a" command allow you to find out about an IP address?

EXPLANATION

In many cases, the "ping -a" command will return the host name if you know the IP address.
This is a good first step when attempting to identify the host.

Share:

Wednesday, April 18, 2018

A hypervisor that runs directly on top of hardware (as opposed to on an OS) is known as:

A hypervisor that runs directly on top of hardware (as opposed to on an OS) is known as:

  • Side saddle
  • Hosted
  • Bare metal
  • Type 2 

 
A hypervisor that runs directly on top of hardware (as opposed to on an OS) is known as:

EXPLANATION

A bare-metal (also known as native or type-1) hypervisor runs directly on the host's hardware to control the hardware and to manage guest operating systems. For this reason, they are sometimes called bare-metal hypervisors.
A guest operating system runs as a process on the host.
Share:

Tuesday, April 17, 2018

Which benefit of being joined to a domain is not natively shared by Apple Macintosh computers?

Which benefit of being joined to a domain is not natively shared by Apple Macintosh computers?

  • Group Policy
  • Password Policy Enforcement
  • Single Sign-On
  • Windows Home Folders 

 
Which benefit of being joined to a domain is not natively shared by Apple Macintosh computers?

EXPLANATION


A domain-joined Mac workstation allows users to enjoy the following privileges:
  • Kerberos authentication and delegation, including Single Sign-On to local, AD, and Open Directory resources
  • AD password policy enforcement
  • Support for AD user and group accounts
  • Windows home folders
Of course, Mac computers do not have a Windows Registry and so therefore cannot be managed natively by Group Policy (the password policy issue previously mentioned is a notable exception).

SOURCE

https://4sysops.com/archives/how-to-join-a-mac-os-x-computer-to-active-directory/
Share:

Friday, April 13, 2018

In Linux and Unix systems, what directory is most likely to contain system configuration data?

In Linux and Unix systems, what directory is most likely to contain system configuration data?

  • /boot/
  • ~/.config
  • /usr/share/doc
  • /etc/ 
 
In Linux and Unix systems, what directory is most likely to contain system configuration data?

EXPLANATION

As a rule, system configuration data should be kept in /etc/ http://tldp.org/LDP/Linux-Filesystem-Hierarchy/Linux-Filesystem-Hierarchy.pdf This can be quite useful knowledge when figuring out backup and recovery plans!
 
Share:

Thursday, April 12, 2018

You setup your server to accept PPTP VPN client connections. You accurately port forward TCP 1723 on the firewall to the server, but clients still cannot connect. Of the below options, what would be the most likely reason?

You setup your server to accept PPTP VPN client connections. You accurately port forward TCP 1723 on the firewall to the server, but clients still cannot connect. Of the below options, what would be the most likely reason?

  • GRE not enabled or blocked on the firewall.
  • Port forward of UDP 1723 missing.
  • No static routes configured on the firewall.
  • Port forward of UDP 500 missing.
You setup your server to accept PPTP VPN client connections. You accurately port forward TCP 1723 on the firewall to the server, but clients still cannot connect. Of the below options, what would be the most likely reason?

EXPLANATION

GRE is an encapsulation protocol required by some PPTP VPN connections, notably Microsoft's implementation. Some cheaper and consumer level firewall/routers do not support or have an option for GRE, or if it does it might be disabled or blocked.
UDP 500 is specific to IPSEC.
Along with the citation, also see...
http://whp-aus1.cold.extweb.hp.com/pub/networking/software/ProCurve-SR-dl-GRE-Config-Guide.pdfhttp://www.cisco.com/c/en/us/support/docs/ip/generic-routing-encapsulation-gre/118361-technote-gre-0....
https://en.wikipedia.org/wiki/Generic_Routing_Encapsulation

SOURCE

https://blogs.technet.microsoft.com/rrasblog/2009/08/12/troubleshooting-common-vpn-related-errors/
Share:

Convert 101101 from binary to decimal!

Convert 101101 from binary to decimal!

  • 44
  • 61
  • 45
  • 41 

Convert 101101 from binary to decimal!

EXPLANATION

Each 1 represents a power of 2, so this is equivalent to 2^5 + 2^3 + 2^2 + 2^0, or 32 + 8 + 4 + 1 = 45.

1 x 1 = 1
0 x 2 = 0
1 x 4 = 4
1 x 8 = 8
0 x 16 = 0
1 x 32 = 32

1 + 4 + 8 + 32 = 45
Share:

Wednesday, April 11, 2018

What's a stealthy and continuous computer hacking process often targeted at a specific entity?

What's a stealthy and continuous computer hacking process often targeted at a specific entity?

  • Shadow ninja attack
  • Advanced persistent threat
  • Advanced malware attack
  • Silent and deadly attack 

 
What's a stealthy and continuous computer hacking process often targeted at a specific entity?

EXPLANATION

An advanced persistent threat (APT) uses multiple phases to break into a network, avoid detection, and harvest valuable information over the long term. The intention of an APT attack is to steal data rather than to cause damage to the network or organization. APTs require a high degree of covertness over an extended period of time.
Share:

Tuesday, April 10, 2018

Which of these cloud distribution models delivers a licensed application to customers over the Internet as an on-demand service?

Which of these cloud distribution models delivers a licensed application to customers over the Internet as an on-demand service?

  • Platform as a service
  • Infrastructure as a service
  • Security as a service
  • Software as a service 

Which of these cloud distribution models delivers a licensed application to customers over the Internet as an on-demand service?


EXPLANATION

Software as a service, or "software on demand," is a software licensing and delivery model where a vendor hosts an application and allows you to download it for a set period of time.
This can be handy if your business wants access to a particular application without the upfront costs of purchasing a full license or dealing with maintenance.
Share:

Monday, April 9, 2018

In which OSI layer does the UDP protocol operate?

In which OSI layer does the UDP protocol operate?

  • Data link
  • Network
  • Session
  • Transport
 
In which OSI layer does the UDP protocol operate?

EXPLANATION




Both TCP and UDP are transport protocols, belonging to the transport layer of the OSI model. Both TCP and UDP run on top of IP, which operates at the network layer.
 
 
Share:

In PowerShell, what cmdlet corresponds to the "FL" alias?

In PowerShell, what cmdlet corresponds to the "FL" alias?

  • Format-Line
  • Format-List
  • For-Loop
  • Folder-Limit 

 
In PowerShell, what cmdlet corresponds to the "FL" alias?

EXPLANATION

Format-List is the long form of the "FL" command. This command is used to change the layout of list items when they are output to the console.
For-Loop, Folder-Limit, and Format-Line are not PowerShell commands.

Share:

Thursday, April 5, 2018

Which of the following would be your first EIGRPv6 command in a new cisco router?

Which of the following would be your first EIGRPv6 command in a new cisco router?

  • interface config: ipv6 eigrp 1
  • global config: ipv6 unicast-routing
  • global config: ipv6 router eigrp 1
  • interface config: ipv6 unicast 

 
Which of the following would be your first EIGRPv6 command in a new cisco router?

EXPLANATION

EIGRPv6 involves the following configuration steps:
- Enable IPv6 routing using the ipv6 unicast-routing command.
- Create an EIGRPv6 process using ipv6 router eigrp asn command.
- Assign an EIGRPv6 router ID using the eigrp router-id router-id command in router configuration mode.
- Enable EIGRPv6 on interfaces using the ipv6 eigrp asn command in interface configuration mode

Share:

In SAP how does a end-user make modifications to their account, for instance change a Printer?

In SAP how does a end-user make modifications to their account, for instance change a Printer?

  • Extras Menu->Settings
  • SU3 or System Menu -> User Profile -> Own Data
  • SAPUSER02
  • US3 or System Menu->Services->Output Control 

 In SAP how does a end-user make modifications to their account, for instance change a Printer?

EXPLANATION

In SAP an individual user account can make certain changes to their account.  Usually this is the Output device, Date Format and Decimal notation.  Administrators can lock out changes to specific fields.
SU3 Maintain Users Own Data

SOURCE


http://www.sapbasiskapil.com/2013/07/how-to-setup-default-printer-in-sap-su3.html
Share:

What does the ALTER TABLE clause do ?

What does the ALTER TABLE clause do ?

  • The SQL ALTER TABLE clause modifies a table definition by altering, adding, or deleting table column
  • The SQL ALTER TABLE clause is used to insert data into database table
  • The SQL ALTER TABLE deletes data from database table
  • The SQL ALTER TABLE clause is used to delete a database table 

 
What does the ALTER TABLE clause do ?

EXPLANATION

Answer is A. SQL ALTER TABLE:  Modifies a table definition by altering, adding, or dropping columns and constraints, reassigning and rebuilding partitions, or disabling or enabling constraints and triggers.


SOURCE

https://docs.microsoft.com/en-us/sql/t-sql/statements/alter-table-transact-sql
Share:

The software layer that abstracts physical resources from the VMs or operating systems running on top is the:

The software layer that abstracts physical resources from the VMs or operating systems running on top is the:

  • Compiler
  • Browser
  • Hypervisor
  • VMBus 

 
The software layer that abstracts physical resources from the VMs or operating systems running on top is the:

EXPLANATION

A hypervisor is computer software that creates and runs virtual machines. A hypervisor also divides the physical resources of a server and allocates them to all of the VMs that it manages.
Share:

What does a bcache in Linux do?

What does a bcache in Linux do?

  • "B" stands for binary coding, the bcache is an prior chaching method.
  • Bcache is a advanced technology to encrypt your cache as an addition to full disc encryption.
  • Bcache has nothing to do with Linux.
  • Allows faster storage devices to act as caching devices for slower storage devices. 


EXPLANATION

Bcache allows one to use an SSD as a read/write cache (in writeback mode) or read cache (writethrough or writearound) for another blockdevice (generally a rotating HDD or array). For an intro to bcache itself, see the bcache homepage.

Share:

Wednesday, April 4, 2018

What does an HTTP error 403 mean?

What does an HTTP error 403 mean?

  • That webpage no longer exists
  • The website cannot display the page
  • Access to the webpage is forbidden
  • The webpage cannot be found 

 
What does an HTTP error 403 mean?

EXPLANATION




HTTP error 403 means that the website declined to show this webpage. The browser is able to reach the server but the server refuses to take any further action. This can happen for a variety of reasons; here are some of the most common:
  • The website's administrator has to give you permission to view the page or the web server doesn't accept public web page requests. If this is a website that you should have access to, contact the website administrator.The web page you're trying to view is generated by a program, such as a shopping cart or search engine, and the folder on the server the program is contained in isn't correctly configured by the website administrator.You've typed a basic web address (for example, www.example.com), but the website doesn't have a default web page (such as index.htm or default.html). Additionally, the website doesn't allow directory listing, which allows you to view files in a web folder.
  • The website's administrator has to give you permission to view the page or the web server doesn't accept public web page requests. If this is a website that you should have access to, contact the website administrator.
  • The web page you're trying to view is generated by a program, such as a shopping cart or search engine, and the folder on the server the program is contained in isn't correctly configured by the website administrator.

  • You've typed a basic web address (for example, www.example.com), but the website doesn't have a default web page (such as index.htm or default.html). Additionally, the website doesn't allow directory listing, which allows you to view files in a web folder.
HTTP error code 404 means that the webpage cannot be found. HTTP error code 410 means that web page no longer exists, and HTTP error 405 occurs when a website cannot display the page.

SOURCE

https://en.wikipedia.org/wiki/HTTP_403
Share:

Tuesday, April 3, 2018

Which of these processor architectures have smartphones traditionally used?

Which of these processor architectures have smartphones traditionally used?

  • Pentium
  • Core i7
  • Phenom II
  • ARM

Which of these processor architectures have smartphones traditionally used?

EXPLANATION

Most commonly, mobile devices use Advanced RISC Machine (ARM) CPUs. Core i7, Phenom II, and the older Pentium are used by desktop and laptop computers.
 
Share:

A group of servers that work together to maintain high availability of applications and services is known as a

A group of servers that work together to maintain high availability of applications and services is known as a

  • Fallover Cluster
  • Fallsafe Cluster
  • Failsafe Cluster
  • Failover Cluster 

A group of servers that work together to maintain high availability of applications and services is known as a

EXPLANATION

A failover cluster is a group of servers that work together to maintain high availability of applications and services. If one of the servers, or nodes, fails, another node in the cluster can take over its workload without any downtime (this process is known as failover).
https://technet.microsoft.com/en-us/library/hh831579(v=ws.11).asp
Share:

Friday, March 30, 2018

The physical server that runs the hypervisor is known as the:

The physical server that runs the hypervisor is known as the:

  • Master
  • Trunk
  • Host
  • Root 
The physical server that runs the hypervisor is known as the:

EXPLANATION


A hypervisor is a program that allows multiple operating systems to share a single hardware host. The hypervisor runs on a host server, which is the physical server that provides the resources used these virtual operating systems. https://en.wikipedia.org/wiki/Hypervisor
The term "Host" comes from the biological relationship between a host and a parasite. http://www.businessdictionary.com/definition/host-computer.html
 

Share:

Thursday, March 29, 2018

A device is having a problem accessing the web and internal network via Ethernet. The ticket says it's an OSI layer 1 issue. What is the most reasonable first troubleshooting step to take once you're at the user's desk?

A device is having a problem accessing the web and internal network via Ethernet. The ticket says it's an OSI layer 1 issue. What is the most reasonable first troubleshooting step to take once you're at the user's desk?

  • Make sure the cable is plugged in and has link lights
  • Check the IP address and make sure it is appropriate for the network
  • See if it works in a different browser
  • Make sure the TCP port isn't blocked 

 
A device is having a problem accessing the web and internal network via Ethernet. The ticket says it's an OSI layer 1 issue. What is the most reasonable first troubleshooting step to take once you're at the user's desk?

EXPLANATION

Layer 1 is the physical layer. This layer transmits raw bits and doesn't differentiate them into packets.
Share:

Wednesday, March 28, 2018

Tuesday, March 27, 2018

Which of the following is true of IMAP?

Which of the following is true of IMAP?

  • It uses port 110
  • It sends and receives email
  • It can only be used to send email
  • It leaves messages on the mail server 

Which of the following is true of IMAP?

EXPLANATION

Unlike POP3, IMAP does not directly download and then remove messages from the mail server. Instead, it leaves the email on the server so that messages can be retrieved from various locations. IMAP is used only to retrieve email and uses port 143.
Here is some further discussion about this question

SOURCE


https://www.siteground.com/tutorials/email/pop3-imap-smtp-ports.htm
Share:

Monday, March 26, 2018

What Linux command sets a files permission?

What Linux command sets a files permission?

  • properties
  • rights
  • chmod
  • attrib 
What Linux command sets a files permission?

EXPLANATION


In order to make this practical, a method had to be devised to protect the users from each other. After all, you could not allow the actions of one user to crash the computer, nor could you allow one user to interfere with the files belonging to another user.
This lesson will cover the following commands:
chmod - modify file access rightssu - temporarily become the superuserchown - change file ownershipchgrp - change a file's group ownership

SOURCE

http://linuxcommand.org/lc3_lts0090.php
Share:

Thursday, March 22, 2018

Which of the following does ROBOCOPY stand for?

Which of the following does ROBOCOPY stand for?

  • Recursive File Copy
  • Robust File Copy
  • Read Only Block Option Copy
  • Robot Copy 
Which of the following does ROBOCOPY stand for?

EXPLANATION

ROBOCOPY, or "Robust File Copy", is a command-line directory and/or file replication command

SOURCE

https://en.wikipedia.org/wiki/Robocopy
Share:

Tuesday, March 20, 2018

Which of these is NOT a PHP class?

Which of these is NOT a PHP class?

  • PDO
  • XMLReader
  • ErrorLog
  • DateTime 

 
Which of these is NOT a PHP class?

EXPLANATION

"ErrorLog" is the correct answer.  PHP has a function called "error_log", but it returns true/false and there is no object-oriented version like there is with some of the other classes.
PDO is a PHP extension for working with databases. XMLReader and DateTime are also classes, though they both have procedural versions too.

Share:

Which of these is NOT a utility that lets you create a bootable live USB drive for Linux?

Which of these is NOT a utility that lets you create a bootable live USB drive for Linux?

  • LiveUSB Install
  • UNetbootin
  • GotLive
  • LiLi 
Which of these is NOT a utility that lets you create a bootable live USB drive for Linux?

EXPLANATION

LinuxLive USB Creator (also known as Lili) is a free and open-source software for Windows that can be used to install various Linux compilations, versions and distributions to a USB Flash Drive. The end result is a Bootable Live USB (in some cases with Persistence as well). UNetbootin allows you to create bootable Live USB drives for Ubuntu and other Linux distributions without burning a CD.

Share:

Cloud solutions that can tolerate failures yet still provide service are referred to as what?

Cloud solutions that can tolerate failures yet still provide service are referred to as what?

  • Highly available
  • Highly portable
  • PaaS
  • IaaS 
Cloud solutions that can tolerate failures yet still provide service are referred to as what?

EXPLANATION

High availability ensures that cloud solutions are always accessible. This means eliminating single points of failure, such as storing data on a single hard disk or single network connections.

Share:

What MySQL feature allows for queries to be run periodically in the background, independent of a front-end program?

What MySQL feature allows for queries to be run periodically in the background, independent of a front-end program?

  • MySQL Automatic Events
  • MySQL Task Manager
  • MySQL Event Scheduler
  • MySQL Scheduled Tasks 

 
What MySQL feature allows for queries to be run periodically in the background, independent of a front-end program?

EXPLANATION

The MySQL Event Scheduler allows for queries to be run in the background at scheduled times, either as a one-off or recurring event.

SOURCE

https://dev.mysql.com/doc/refman/5.7/en/events-overview.html
Share:

On a Cisco Catalyst switch, what are the Layer 3 interfaces called that are used to accomplish inter-VLAN routing?

On a Cisco Catalyst switch, what are the Layer 3 interfaces called that are used to accomplish inter-VLAN routing?

  • SVI
  • SIP
  • Trunk interfaces
  • RIP 
On a Cisco Catalyst switch, what are the Layer 3 interfaces called that are used to accomplish inter-VLAN routing?

  EXPLANATION



VLANs divide broadcast domains in a LAN environment. Whenever hosts in one VLAN need to communicate with hosts in another VLAN, the traffic must be routed between them. This is known as inter-VLAN routing. On Catalyst switches it is accomplished by creating Layer 3 interfaces known as Switch Virtual Interfaces (SVI).
Learn more
Share:

By default, which of the following is NOT a legitimate Linux run level?

By default, which of the following is NOT a legitimate Linux run level?

  • 4: Normal mode
  • 6: Reboot system
  • 1: Single-user mode
  • 3: Multi-user mode with networking 
By default, which of the following is NOT a legitimate Linux run level?

EXPLANATION

A Linux run level defines the state of the system after boot. Conventionally, seven run levels exist, numbered from zero to six. They include:
0: Halt system
1: Single-user mode
2: Basic multi-user mode without NFS
3: Multi-user mode with networking
4: Unused
5: Multi-user mode with GUI

6: Reboot system

SOURCE


Share:

What is not true about HSRP?

What is not true about HSRP?

  • Preempt is set by default
  • It is described in RFC 2281
  • Can track an interface for failover
  • Cisco proprietary protocol 
What is not true about HSRP?

 EXPLANATION

Hot Standby Router Protocol (HSRP) is a Cisco proprietary routing protocol that allows host computers on the Internet to use multiple routers that act as a single virtual router, maintaining connectivity even if the first hop router fails, because other routers are on "hot standby" - ready to go. HSRP's preempt has to be manually set with the "standby vlan-number preempt" command in the Vlan interface configuration mode.

SOURCE

http://www.cisco.com/c/en/us/support/docs/ip/hot-standby-router-protocol-hsrp/9234-hsrpguidetoc.html
Share:

Which of the following Powershell commands would give User2 access to User1's calendar? User2 does not currently have access to anything of User1's

Which of the following Powershell commands would give User2 access to User1's calendar? User2 does not currently have access to anything of User1's

  • Add-MailboxFolderPermission -Identity User1@contoso.com:\Calendar -User User2 -AccessRights Owner
  • Set-MailboxFolderPermission -Identity User1@contoso.com:\Calendar -User User2 -AccessRights Owner
  • Add-MailboxPermission -Identity User1@contoso.com:\Calendar -User User2 -AccessRights Owner
  • Set-MailboxPermission -Identity User1@contoso.com:\Calendar -User User2 -AccessRights Owner 
Which of the following Powershell commands would give User2 access to User1's calendar? User2 does not currently have access to anything of User1's

EXPLANATION

There are two things to notice.  First is that you're trying to give new permissions to User2 and not change current permissions of User2 within User1's mailbox.  So we'll want to use Add instead of Set.  Set is used to change permissions if a user already has some sort of permissions within the mailbox.

The second thing is that the calendar is a folder within the mailbox.  We don't want User2 to be able to read User1's emails, so we'll do Add-MailboxFolderPermission instead of Add-MailboxPermission.

SOURCE

https://technet.microsoft.com/en-us/library/dd298062(v=exchg.160).aspx
Share:

Which of these is not a valid option when right clicking a powered on (running) virtual machine in vCenter?

Which of these is not a valid option when right clicking a powered on (running) virtual machine in vCenter?

  • Migrate
  • Rename
  • Clone
  • Remove from Inventory 

Which of these is not a valid option when right clicking a powered on (running) virtual machine in vCenter?

EXPLANATION

You cannot remove a powered on virtual machine from the vCenter inventory.  The VM has to be shut down first.
Share:

A webpage has six images with large margins. These margins cause viewing problems on small screens such as phones. Which css will remove the margins on small devices?

A webpage has six images with large margins. These margins cause viewing problems on small screens such as phones. Which css will remove the margins on small devices?

  • @media screen and (max-width:600;){ img {margin:0px;} }
  • @media screen and (max-width:600px){ #img {margin:0px;} }
  • @media screen and (max-width:600px){ img {margin:0px;} }
  • @media screen and (min-width:600px){ img {margin:0px;} } 

 
A webpage has six images with large margins. These margins cause viewing problems on small screens such as phones. Which css will remove the margins on small devices?

EXPLANATION

img is an HTML tag, so it is referred to without any prefix. #img would be an ID, which can only refer to a single item, so would not be suitable here. (In practice we might use a class though.)
max-width will apply the conditional css to screens of less than the stated width. min-width would affect only larger screens, which is not what we want.
Nasty gotcha: (max-width:600;) is invalid syntax. Although this looks like a standard css statement, it is actually a special comparison clause. It must not be terminated with a semicolon. (Trailing semicolons are optional on single css statements, but for some obscure reason are not allowed here.) 

SOURCE

https://www.w3schools.com/cssref/css3_pr_mediaquery.asp
Share:

When open source software is used in SaaS, it is called ____________ SaaS.

When open source software is used in SaaS, it is called ____________ SaaS.

  • Free
  • Closed
  • Freemium
  • Open
When open source software is used in SaaS, it is called ____________ SaaS.

EXPLANATION

A lot of SaaS services use open source software and are thus called open SaaS services.
 
Share:

What are the three switch port states of the rapid spanning tree protocol (RSTP)?

What are the three switch port states of the rapid spanning tree protocol (RSTP)?

  • Blocking, Learning, Forwarding
  • Disabled, Listening, Forwarding
  • Discarding, Learning, Forwarding
  • Disabled, Blocking, Forwarding 
What are the three switch port states of the rapid spanning tree protocol (RSTP)?

EXPLANATION

There are 3 port states in RSTP (802.1w) that correspond to the three possible operational states. The 802.1D disabled, blocking, and listening states are merged into a unique 802.1w discarding state. The end result is faster reconvergence time. So the three switch port states are:
  • Discarding - No user data is sent over the port
  • Learning - The port is not forwarding frames yet, but is populating its MAC-address-table
  • Forwarding - The port is fully operational

Share:

What cloud computing characteristic ensures services and data are always reachable?

What cloud computing characteristic ensures services and data are always reachable?

  • Integrity
  • Availability
  • Scalability
  • Confidentiality 
What cloud computing characteristic ensures services and data are always reachable?

EXPLANATION


Availability ensures that something is reachable at any time

SOURCE

https://quizlet.com/45222112/comptia-cloud-essentials-certification-practice-questions-flash-cards/
Share:

Which of the following are built-in functions in SQL?

Which of the following are built-in functions in SQL?

  • SUM, AVG, MIN, MAX, MULT
  • SUM, AVG, MULT, DIV, MIN
  • SUM, AVG, MIN, MAX, NAME
  • COUNT, SUM, AVG, MAX, MIN 
 
Which of the following are built-in functions in SQL?
 

EXPLANATION

COUNT, SUM, AVG, MAX, and MIN are all built-in functions in SQL.
Share:

What is a small program or function that automates a specific task called?

What is a small program or function that automates a specific task called?

  • Macro
  • Nano
  • Micro
  • Mongo 
What is a small program or function that automates a specific task called?

 

EXPLANATION

A macro is a small program, or script, that automates common tasks. These scripts are usually run within programs and can often be created by the user. For example, a user might record a macro for Microsoft Word that inserts his entire address when he presses a custom key combination.

SOURCE

https://techterms.com/definition/macro
Share:

How many usable IP addresses are in a single Class C block?

How many usable IP addresses are in a single Class C block?

  • 24
  • 508
  • 36000
  • 254

How many usable IP addresses are in a single Class C block?

EXPLANATION

There are 256 actual addresses, but the 0 and 255 host addresses are not usable, giving you only 254 usable addresses. The .255 is used as the broadcast address, anything sent to that address should be answered by all devices in the same IP Block. The .0 address is reserved as the network address and is not usable as a host address.
Share:

Which of the Following is NOT a Sync Type when Syncing Files and Folders using SyncToy, FreeFileSync and other File Syncing Tools?

Which of the Following is NOT a Sync Type when Syncing Files and Folders using SyncToy, FreeFileSync and other File Syncing Tools?

  • Dedupe
  • Contribute (Update)
  • Sync (Two-Way Sync)
  • Mirror 

 
  Which of the Following is NOT a Sync Type when Syncing Files and Folders using SyncToy, FreeFileSync and other File Syncing Tools?

EXPLANATION

Dedupe is a Storage Technology which operates on a block level to save storage space using pointers to data blocks. It is not a file level operation.
Contribute / Update -> Updates Files from the Left Folder Path to the Right without deleting any files or folders. Renamed, Modified and New Files and Folders are added from Left to Right.
Sync (Two-Way Sync) - New items, Renames, Modifications and Deletions are synced from Left to Right and Right to Left Paths (both directions).
Mirror - Copies and Overwrites all file and folder items from the Left Path to The Right Path - creates a mirror copy from Left to Right File Paths. Useful for Backups to removable storage such as USB External Hard Drives.

SOURCE

https://en.wikipedia.org/wiki/File_synchronization
Share:

Which of the following is NOT an RFID frequency band?

Which of the following is NOT an RFID frequency band?

  • 865-868 MHz
  • 902-928 MHz
  • 470-512 MHz
  • 13.56 MHz 

 
Which of the following is NOT an RFID frequency band?

EXPLANATION




470–512 MHz is in use in the US for low-band TV channels 14–20 (also shared for land mobile 2-way radio use in some areas). https://en.wikipedia.org/wiki/Ultra_high_frequency#United_States
All other frequencies mentioned are used for RFID communication: https://en.wikipedia.org/wiki/Radio-frequency_identification

Share:

What do you call a series of SCSI devices working together through a host adapter?

What do you call a series of SCSI devices working together through a host adapter?

  • An SCSI controller
  • An SCSI chain
  • Cabled SCSI
  • RAID 
  What do you call a series of SCSI devices working together through a host adapter?

EXPLANATION

A series of SCSI devices working together through a host adapter is called an SCSI chain. The host adapter provides the interface between the SCSI chain and the PC.

Share:

If you want to cluster MySQL databases, what software do you use?

If you want to cluster MySQL databases, what software do you use?

  • MySQL Cluster
  • Apache Hadoop
  • Kubernetes
  • Beowulf 
If you want to cluster MySQL databases, what software do you use?

 EXPLANATION

MySQL Cluster provides shared-nothing clustering and auto-sharding for the MySQL database management system. It is designed to provide high availability and high throughput with low latency, while allowing for near linear scalability.

Share:

For files in Unix and Linux, "atime" means most recent access time. What does "ctime" mean?

For files in Unix and Linux, "atime" means most recent access time. What does "ctime" mean?

  • the time that file was most recently copied
  • the file's data change time
  • the file's status change time
  • the file's creation time 
For files in Unix and Linux, "atime" means most recent access time. What does "ctime" mean?

EXPLANATION

atime is access time, or when the file was last read.
mtime is modification time, or when the file's data was last modified.
ctime is change time, or when the files status (metadata) was last changed.  Metadata, data about the file as opposed to data in the file, is held in the file's inode.
Unix jargon for "the time a file's status last changed". Change time and creation time (ctime)Unix and Windows file systems interpret 'ctime' differently:Unix systems maintain the historical interpretation of ctime as being the time when certain file metadata, not its contents, were last changed, such as the file's permissions or owner (e.g. 'This file's metadata was changed on 05/05/02 12:15pm').    Windows systems use ctime to mean 'creation time'[citation needed] (also called 'birth time') (e.g. 'This file was created on 05/05/02 12:15pm').


SOURCE

https://www.tldp.org/LDP/Linux-Dictionary/html/Linux-Dictionary.html
Share:

Popular Posts

Blog Archive