IT Questions and Answers :)

Thursday, November 23, 2017

Which of the following is not a primary biometric authentication?

Which of the following is not a primary biometric authentication?

  • Body scanner
  • Voice
  • Fingerprint
  • Iris pattern 
Which of the following is not a primary biometric authentication?

 

EXPLANATION

Body scanners are soft biometrics. Soft biometrics traits are physical, behavioral or human characteristics that have been derived from the way human beings normally distinguish their peers (such as height, gender, and hair color). They are used to complement the identity information provided by the primary biometric identifiers .
https://en.wikipedia.org/wiki/Biometrics#Soft_biometrics 

Share:

In Hyper-V, which of the following features enables two VMs hosted on the same physical machine to communicate without going outside the host system?

In Hyper-V, which of the following features enables two VMs hosted on the same physical machine to communicate without going outside the host system?

  • Virtual LAN
  • Virtual Network
  • Virtual switch
  • Virtual PBX 
In Hyper-V, which of the following features enables two VMs hosted on the same physical machine to communicate without going outside the host system?

 

EXPLANATION

Hypervisors come with virtual switching capabilities, which enable the VMs to communicate without going outside of the host system. Depending on your hypervisor, this virtual switch can do everything you'd expect from a typical managed Layer 2 switch.

SOURCE

http://www.altaro.com/hyper-v/the-hyper-v-virtual-switch-explained-part-1/
Share:

Which of the following NoSQL databases is considered a document database?

Which of the following NoSQL databases is considered a document database?

  • Cassandra
  • Druid
  • MongoDB
  • HBase 

 
Which of the following NoSQL databases is considered a document database?

EXPLANATION

A NoSQL (originally referring to "non SQL" or "non relational") database provides a mechanism for storing and retrieving data which is modeled in means other than the tabular relations used in relational databases. MongoDB is document-oriented database, or document store, designed for storing, retrieving, and managing semi-structured data.. Cassandra, Druid, and HBase are column databases, a NoSQL object of the lowest level in a keyspace. It is a tuple consisting of three elements: unique name, value, and timestamp.

Share:

What is the decimal answer to the binary equation 10111110 + 01001101?

What is the decimal answer to the binary equation 10111110 + 01001101?

  • 247
  • 269
  • 198
  • 267 

 
What is the decimal answer to the binary equation 10111110 + 01001101?

EXPLANATION

190 + 77 = 267
For additional information on binary numbers: https://en.wikipedia.org/wiki/Binary_number
For how to convert binary numbers: http://www.wikihow.com/Convert-from-Decimal-to-Binary
 
Share:

What "bit" architecture did the Intel 8086 use?

What "bit" architecture did the Intel 8086 use?

  • 16
  • 32
  • 4

 
What "bit" architecture did the Intel 8086 use?

EXPLANATION

Intel 8086 microprocessor is a first member of x86 family of processors. Advertised as a "source-code compatible" with Intel 8080 and the Intel 8085 processors, the 8086 was not object code compatible with them. The 8086 has complete 16-bit architecture - 16-bit internal registers, 16-bit data bus, and 20-bit address bus (1 MB of physical memory). Because the processor has 16-bit index registers and memory pointers, it can effectively address only 64 KB of memory. To address memory beyond 64 KB the CPU uses segment registers - these registers specify memory locations for code, stack, data and extra data 64 KB segments. The segments can be positioned anywhere in memory, and, if necessary, user programs can change their position. This addressing method has one big advantage - it is very easy to write memory-independent code when the size of code, stack and data is smaller than 64 KB each. The complexity of the code and programming increases, sometimes significantly, when the size of stack, data and/code is larger than 64 KB. To support different variations of this awkward memory addressing scheme many 8086 compilers included 6 different memory models: tiny, small, compact, medium, large and huge. 64 KB direct addressing limitation was eliminated with the introduction of the 32-bit protected mode in intel 80386 Processor
Share:

Popular Posts