IT Questions and Answers :)

Saturday, April 28, 2018

What are the tones called when you press a key on your telephone?

What are the tones called when you press a key on your telephone?

  • Multiple Frequency Tone Signal
  • Dual Signal Tone Frequency
  • Dual Tone Multiple Frequency (MF4)
  • Single Tone Frequency 
What are the tones called when you press a key on your telephone?

EXPLANATION

DTMF (dual tone multi-frequency) is the beeping signal to the phone company that you generate when you press an ordinary telephone's touch keys.

https://en.wikipedia.org/wiki/Dual-tone_multi-frequency_signaling

SOURCE


Share:

What is DCL used for in SQL?


What is DCL used for in SQL?

  • Monitor database transactions
  • Solving deadlock situations
  • Control access to data stored in a database
  • Control database size and archiving schedule 

 

EXPLANATION

A data control language (DCL) is a syntax similar to a computer programming language used to control access to data stored in a database (Authorization). In particular, it is a component of Structured Query Language (SQL).
Share:

Monday, April 23, 2018

Amazon DNS service is called?

Amazon DNS service is called?

  • EC2
  • S3 Bucket
  • SES
  • Route 53 
 
Amazon DNS service is called?

EXPLANATION

Amazon Route 53 is a highly available and scalable cloud Domain Name System (DNS) web service. It is designed to give developers and businesses an extremely reliable and cost effective way to route end users to Internet applications by translating names like www.example.com into the numeric IP addresses. 

SOURCE

https://aws.amazon.com/route53/
 
Share:

Friday, April 20, 2018

In PowerShell, which of the following is a feature that you use to assign a set of commands (optionally with input parameters) to execute by a single name?

In PowerShell, which of the following is a feature that you use to assign a set of commands (optionally with input parameters) to execute by a single name?

  • subroutine
  • procedure
  • function
  • method 

 
In PowerShell, which of the following is a feature that you use to assign a set of commands (optionally with input parameters) to execute by a single name?

EXPLANATION


In PowerShell, functions can act like miniature scripts within scripts which are executed by name, and they can be everything from a few commands, to full blown cmdlets written entirely in PowerShell (called Advanced Functions).
about_Functions on MSDN: https://msdn.microsoft.com/en-us/powershell/reference/4.0/microsoft.powershell.core/about/about_func...
about_Functions_Advanced on MSDN: https://msdn.microsoft.com/en-us/powershell/reference/4.0/microsoft.powershell.core/about/
Methods exist in PowerShell as well, as members of .NET objects: https://msdn.microsoft.com/en-us/powershell/reference/4.0/microsoft.powershell.core/about/about_meth...
Note: you can also access the above three directly in PowerShell with the commands:
Get-Help about_Functions
Get-Help about_Functions_Advanced
Get-Help about_Methods
Going beyond PowerShell, this is mostly a naming convention: the differences between the four names seem to vary from language to language.  While there are general technical definitions for each of the terms (for instance, "functions return a value; procedures do not"), these are not used universally among languages and programmers; as such, it's generally best to follow the naming convention common to the specific language.For more reading on the terms: http://softwareengineering.stackexchange.com/questions/20909/method-vs-function-vs-procedure

Share:

Thursday, April 19, 2018

In Windows, What does the "ping -a" command allow you to find out about an IP address?

In Windows, What does the "ping -a" command allow you to find out about an IP address?

  • Router address of the host
  • IP address of the host
  • Resolve the host name
  • Default gateway of the host 

 
In Windows, What does the "ping -a" command allow you to find out about an IP address?

EXPLANATION

In many cases, the "ping -a" command will return the host name if you know the IP address.
This is a good first step when attempting to identify the host.

Share:

Popular Posts