IT Questions and Answers :)

Thursday, November 21, 2019

What is the subnet for a class C network?

What is the subnet for a class C network?

  • 0.255.255.255
  • 255.255.255.255
  • 255.255.255.0
  • 255.255.0.255 

What is the subnet for a class C network?

EXPLANATION

If we use the default subnet mask with a Class C network address,
then we already know that three bytes are used to define the network and only one byte is used to define the hosts on each network. The default Class C mask is: 255.255.255.0.

SOURCE

https://support.microsoft.com/en-in/help/164015/understanding-tcp-ip-addressing-and-subnetting-basics
Share:

Wednesday, November 20, 2019

In SQL Server, what is backward recovery?

In SQL Server, what is backward recovery?

  • Switching to an existing copy of the database
  • Applying after-images to the database
  • Applying after-images and before-images to the DB
  • Applying before-images to the database 
In SQL Server, what is backward recovery?

EXPLANATION

Backwards recovery can be thought of as simply restoring the last saved point. Forward recovery is often about starting from the last saved point and then applying transactions that are newer than the save point, i.e. you are now forward of the save point.

Backward Recovery. Backward recovery restores a journaled database to a prior state. Backward processing starts by rolling back updates to a checkpoint (specified by -SINCE or -AFTER) prior to the desired state and replaying database updates forward till the desired state.
 

 

Share:

In SQL Server, what does the transaction log include?

In SQL Server, what does the transaction log include?

  • The after-image of a record
  • The before and after-image of a record
  • The essential data of the record
  • The before-image of a record 
In SQL Server, what does the transaction log include?

EXPLANATION

The simple answer is that a data backup must include some transaction log otherwise the backup isn’t valid. When a database backup is restored, the result must be a transactionally consistent database (i.e. with no uncommitted transactions or structural inconsistencies).

Every SQL Server database has a transaction log that records all transactions and the database modifications made by each transaction.
The transaction log is a critical component of the database. If there is a system failure, you will need that log to bring your database back to a consistent state.

 

Share:

Which company was NOT part of the creation of the Ethernet standard?

Which company was NOT part of the creation of the Ethernet standard?

  • Intel
  • Xerox
  • IBM
  • Digital Equipment Corp 

EXPLANATION

Ethernet /ˈθərnɛt/ is a family of computer networking technologies commonly used in local area networks (LAN), metropolitan area networks (MAN) and wide area networks (WAN).[1] It was commercially introduced in 1980 and first standardized in 1983 as IEEE 802.3, and has since retained a good deal of backward compatibility and been refined to support higher bit rates and longer link distances. Over time, Ethernet has largely replaced competing wired LAN technologies such as Token Ring, FDDI and ARCNET.
The original 10BASE5 Ethernet uses coaxial cable as a shared medium, while the newer Ethernet variants use twisted pair and fiber optic links in conjunction with switches. Over the course of its history, Ethernet data transfer rates have been increased from the original 2.94 megabits per second (Mbit/s)[2] to the latest 400 gigabits per second (Gbit/s). The Ethernet standards comprise several wiring and signaling variants of the OSI physical layer in use with Ethernet.
Systems communicating over Ethernet divide a stream of data into shorter pieces called frames. Each frame contains source and destination addresses, and error-checking data so that damaged frames can be detected and discarded; most often, higher-layer protocols trigger retransmission of lost frames. As per the OSI model, Ethernet provides services up to and including the data link layer.[3] The 48-bit MAC address was adopted by other IEEE 802 networking standards, including IEEE 802.11 Wi-Fi, as well as by FDDI, and EtherType values are also used in Subnetwork Access Protocol (SNAP) headers.
Ethernet is widely used in homes and industry. The Internet Protocol is commonly carried over Ethernet and so it is considered one of the key technologies that make up the Internet.

DEC, Intel and Xerox through their collaboration to create the DIX standard, were champions of Ethernet, but DEC is the company that made Ethernet commercially successful. Initially, Ethernet-based DECnet and LAT protocols interconnected VAXes with DECserver terminal servers. Starting with the Unibus to Ethernet adapter, multiple generations of Ethernet hardware from DEC were the de facto standard. The CI "computer interconnect" adapter was the industry's first network interface controller to use separate transmit and receive "rings".

 

Share:

Which of the following statements is true?

Which of the following statements is true?

  • SaaS is used by software developers
  • Applications cannot be developed in the cloud
  • PaaS is used by end users
  • PaaS is used to create web services 
Which of the following statements is true?

EXPLANATION

There are dozens of possible ways to develop software. A wide variety of existing programming languages with their own strong and weak sides, frameworks, libraries, and other development tools allow creating applications of different types: for desktops, for mobile devices, web applications that work via browser, etc. Different software development methodologies and frameworks like Scrum or Kanban will help you adapt to the development process for various types of projects, reduce costs, eliminate risks, and use the available resources efficiently. But besides the development itself, there’s another important issue that requires close attention. We’re talking about the way of licensing and delivering the software.
When there’s a need to choose what framework, technology, or a programming language should be used during the development process, in most cases, the development company makes the final decision, and the customer relies on the developer’s experience and skills. But the chosen software delivery model affects both the customer and the developer because different models have different pros and cons and require different development strategy.
In this article, we’ll talk about one of the existing software licensing and delivery models named Software as a Service, or SaaS, to be short, and the key benefits it offers.

Share:

Popular Posts