IT Questions and Answers :)

Tuesday, August 21, 2018

Which of the following is implemented exclusively as firmware?

Which of the following is implemented exclusively as firmware?

  • BIOS
  • Linux
  • Database
  • Wi-Fi 

 
Which of the following is implemented exclusively as firmware?

EXPLANATION

Firmware is software that is permanently programmed into a device's read-only memory. Basic Input/Output System (BIOS) is an example of firmware.
Share:

Tuesday, March 20, 2018

What is a small program or function that automates a specific task called?

What is a small program or function that automates a specific task called?

  • Macro
  • Nano
  • Micro
  • Mongo 
What is a small program or function that automates a specific task called?

 

EXPLANATION


A macro is a small program, or script, that automates common tasks. These scripts are usually run within programs and can often be created by the user. For example, a user might record a macro for Microsoft Word that inserts his entire address when he presses a custom key combination.

SOURCE

https://techterms.com/definition/macro
Share:

Friday, January 12, 2018

What is Puppet used for?

What is Puppet used for?

  • Advanced threat management
  • Configuration management
  • Remote desktop operations
  • Backups and restores 

 
What is Puppet used for?

EXPLANATION

Puppet is an open-source configuration management tool that runs on Unix-like systems as well as on Microsoft Windows. It has its own declarative language that you can use to describe your system's configuration.
Share:

Friday, December 22, 2017

In Cisco IOS, how do you enter into Privileged EXEC mode?

In Cisco IOS, how do you enter into Privileged EXEC mode?

  • Login
  • Enable
  • Su
  • Exec 
In Cisco IOS, how do you enter into Privileged EXEC mode?

EXPLANATION

Privileged EXEC mode is password protected, and allows the use of all EXEC mode commands available on the system. To enter privileged EXEC mode from user EXEC mode, use the enable command. Privileged EXEC mode allows access to global configuration mode through the use of the enable command. The privileged EXEC mode prompt consists of the devices's host name followed by the pound sign: Router# .
http://www.cisco.com/c/en/us/td/docs/ios/12_2/configfun/configuration/guide/ffun_c/fcf019.html

Share:

Thursday, November 23, 2017

What is the decimal answer to the binary equation 10111110 + 01001101?

What is the decimal answer to the binary equation 10111110 + 01001101?

  • 247
  • 269
  • 198
  • 267 

 
What is the decimal answer to the binary equation 10111110 + 01001101?

EXPLANATION

190 + 77 = 267
For additional information on binary numbers: https://en.wikipedia.org/wiki/Binary_number
For how to convert binary numbers: http://www.wikihow.com/Convert-from-Decimal-to-Binary
 
Share:

Convert 101 from decimal to binary.

Convert 101 from decimal to binary.

  • 1010101
  • 1110111
  • 1011001
  • 1100101

 
Convert 101 from decimal to binary.

EXPLANATION

From right to left, each column represents double the last column starting with the number 1. So the answer: 1100101 represents from right to left: (1x1) + (0x2) + (1x4) + (0x8) + (0x16) + (1x32) + (1x64) = 101.
Share:

Wednesday, November 22, 2017

Which file does UEFI look for when booting a 32bit system?

Which file does UEFI look for when booting a 32bit system?

  • \EFI\boot\bootx86.efi
  •  \EFI\boot\bootia32.efi
  • The Master Boot Record (MBR)
  • \EFI\boot\boot_x86.exe

Which file does UEFI look for when booting a 32bit system?

EXPLANATION

The Unified Extensible Firmware Interface looks for FAT32 media containing a folder named \EFI\boot which contains boot executables.
The boot filename depends on the architecture being booted and files for multiple architectures may be present. See the source for more info

SOURCE

http://www.uefi.org/sites/default/files/resources/UEFI%20Spec%202_6.pdf
Share:

Employees in your organization access web-based e-mail using cloud-based technologies. What type of technology is this?

Employees in your organization access web-based e-mail using cloud-based technologies. What type of technology is this?

  • IaaS
  • Network-based DLP
  • SaaS
  • PaaS 

Employees in your organization access web-based e-mail using cloud-based technologies. What type of technology is this?

EXPLANATION


Software as a service (SaaS; pronounced /sæs/) is a software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted. It is sometimes referred to as "on-demand software", and was formerly referred to as "software plus services" by Microsoft. SaaS is typically accessed by users using a thin client via a web browser. SaaS has become a common delivery model for many business applications, including office and messaging software, payroll processing software, DBMS software, management software, CAD software, development software, gamification, virtualization,[4] accounting, collaboration, customer relationship management (CRM), Management Information Systems (MIS), enterprise resource planning (ERP), invoicing, human resource management(HRM), talent acquisition, content management (CM), and service desk management. SaaS has been incorporated into the strategy of nearly all leading enterprise software companies. 

SOURCE

https://en.wikipedia.org/wiki/Software_as_a_service


Share:

What is it called when you add one group in Active Directory to another group?

What is it called when you add one group in Active Directory to another group?

  •  Nesting
  • Attaching
  • Grouping
  • Distributing 
What is it called when you add one group in Active Directory to another group?

EXPLANATION

When you add an Active Directory group as a member of an existing group, this is called nesting. You might nest groups to consolidate member accounts and reduce replication traffic.
Share:

Popular Posts