IT Questions and Answers :)

Monday, April 22, 2019

Which Microsoft product was code named Snowball?

Which Microsoft product was code named Snowball?

  • Windows 95
  • Windows Vista
  • Windows Server 2016
  • Windows For Workgroups 3.11 
 Which Microsoft product was code named Snowball?


EXPLANATION

Operating systems

Windows 3.1x and 9x

Codename Preliminary name Final name Notes Ref
Janus N/A Windows 3.1 N/A [2][3]
Sparta, Winball Windows Plus Windows for Workgroups 3.1 Windows 3.1 (16-bit) with enhanced networking; designed to work particularly well as a client with the new Windows NT. [4][5]
Snowball Windows for Workgroups 3.10 Windows for Workgroups 3.11 Although this release was still 16-bit Windows, it included a 32-bit TCP/IP stack (when running on compatible hardware). Along with Win32s, this was one of the first steps towards moving the Windows desktop to a 32-bit code base. [6]
Chicago Windows 4.0 Windows 95 For codenames of some of the internal components of Windows 95, see "Jaguar", "Cougar", "Panther" and "Stimpy" under § OS components. [7][8]
Detroit Windows 4.1 Windows 95 OSR 2 Named after Detroit, Michigan. A writer for Maximum PC suggested that "Detroit" and other Windows 95-era names were answers to the question posed by Microsoft's "Where do you want to go today?" marketing campaign. [9]
Nashville Windows 96 N/A Cancelled upgrade for Windows 95; sometimes referred to in the press as Windows 96. Codename was reused for Internet Explorer 4.0 and Windows Desktop Update which incorporated many of the technologies planned for Nashville. [10][11]
Memphis Windows 97, Windows 4.1 Windows 98 N/A [12]
Millennium Windows 4.9 Windows ME ME stands for Millennium Edition.

 

Share:

What are the types of Eavesdropping attacks?

What are the types of Eavesdropping attacks?

  • Passive & Active
  • Data driven & software written
  • Right & Wrong
  • malicous & outbound 

What are the types of Eavesdropping attacks?

EXPLANATION

Eavesdropping attacks occur through the interception of network traffic. By eavesdropping, an attacker can obtain passwords, credit card numbers and other confidential information that a user might be sending over the network. Eavesdropping can be passive or active:
  • Passive eavesdropping — A hacker detects the information by listening to the message transmission in the network.
  • Active eavesdropping — A hacker actively grabs the information by disguising himself as friendly unit and by sending queries to transmitters. This is called probing, scanning or tampering.
Detecting passive eavesdropping attacks is often more important than spotting active ones, since active attacks requires the attacker to gain knowledge of the friendly units by conducting passive eavesdropping before.
Data encryption is the best countermeasure for eavesdropping.

SOURCE

https://blog.netwrix.com/2018/05/15/top-10-most-common-types-of-cyber-attacks/#Eavesdropping%20attack
Share:

In telecommunications, what does DIA stand for?

In telecommunications, what does DIA stand for?

  • Dynamic Internet Access
  • Digital Internet Access
  • Direct Internet Access
  • Dedicated Internet Access 


EXPLANATION

 These are data center applications which might require your company to need a Dedicated Internet Access (DIA) circuit, instead of the average, cost-effective business Internet access types, like Fios, U-verse, business-class cable, and DSL.

Types of Dedicated Internet Access circuits include:
Dedicated Fiber (a.k.a. fast ethernet, metro ethernet, ethernet over fiber); Ethernet over Copper (EoC); T-1 (DS-1); T-3 (DS-3); and Dedicated Fixed-Wireless.
The type of DIA circuit your company needs, depends on the circuit types available at your address and the bandwidth your company requires. In theory, the type of DIA circuit (i.e. fiber vs. T-1), only affects the bandwidth and price of the Internet connection.

SOURCE

 https://acronyms.thefreedictionary.com/dia

Share:

On ESXi, how is the parent-child relation determined between the base disk file and it's delta files, when a snapshot of a VM is taken.

On ESXi, how is the parent-child relation determined between the base disk file and it's delta files, when a snapshot of a VM is taken.

  • Through VMFS metadata
  • Through ESXi database
  • Through .vmx file
  • Through .vmdk descriptor file 

On ESXi, how is the parent-child relation determined between the base disk file and it's delta files, when a snapshot of a VM is taken.

EXPLANATION

 Delta disk files: A .vmdk file to which the guest operating system can write. The delta disk represents the difference between the current state of the virtual disk and the state that existed at the time that the previous snapshot was taken. When you take a snapshot, the state of the virtual disk is preserved, which prevents the guest operating system from writing to it, and a delta or child disk is created. A delta disk has two files, including a descriptor file that is small and contains information about the virtual disk and a corresponding file that contains the raw data. The files that make up the delta disk are referred to as child disks or redo logs.


Share:

What is the name of Microsoft's virtualization suite?

What is the name of Microsoft's virtualization suite?

  • Hyper-V
  • VM Ware
  • Viridian
  • Windows Server Virtualization 
What is the name of Microsoft's virtualization suite?

EXPLANATION

VMware
vmware.comVMware, Inc. is a subsidiary of Dell Technologies that provides cloud computing and platform virtualization software and services. It was the first commercially successful company to virtualize the x86 architecture.
Hyper-V

Microsoft Hyper-V, codenamed Viridian and formerly known as Windows Server Virtualization, is a native hypervisor; it can create virtual machines on x86-64 systems running Windows. Starting with Windows 8, Hyper-V superseded Windows Virtual PC as the hardware virtualization component of the client editions of Windows NT. A server computer running Hyper-V can be configured to expose individual virtual machines to one or more networks.
Type:Native hypervisor
Included with:Windows Server 2008 and later, Select editions of Windows 8 and later
Replaces:Windows Virtual PC

Share:

Popular Posts