IT Questions and Answers :)

Wednesday, November 27, 2019

Excluding the host adapter, how many devices can be connected to a single narrow SCSI bus?

Excluding the host adapter, how many devices can be connected to a single narrow SCSI bus?

  • 8
  • 32
  • 7
  • 12 

EXPLANATION

Up to 8 devices can be attached to a single SCSI bus. One of these is the host adapter, leaving room for 7 'real' devices.

SOURCE

http://ask.microsemi.com/app/answers/detail/a_id/1971/~/how-many-scsi-devices-can-be-attached-on-a-scsi-controller%3F
Share:

Monday, November 25, 2019

What is a zero day vulnerability?

What is a zero day vulnerability?

  • A hole in software that is unknown to the vendor
  • A vulnerability exploited after it has been patched
  • An attack by a programmer on a vulnerability in their own code.
  • An attack on the very first day of a product's release


What is a zero day vulnerability?

EXPLANATION

A zero day vulnerability refers to a hole in software that is unknown to the vendor.
In a zero day attack, this security hole is exploited by hackers before the vendor becomes aware of the problem and patches it.

SOURCE

Share:

Which of the following automation and configuration management platforms are agentless and use SSH or WinRM as connection/control mechanisms.

Which of the following automation and configuration management platforms are agentless and use SSH or WinRM as connection/control mechanisms.

  • Chef
  • Ansible
  • PepperStack
  • Puppet

 
Which of the following automation and configuration management platforms are agentless and use SSH or WinRM as connection/control mechanisms.

EXPLANATION

Additional links provided below:

  • Puppet and Chef use agents installed on the node to communicate with the server.
  • PepperStack is a fake name for SaltStack which is another agentless configuration management platform.
  • Ansible uses agentless communication through SSH to control devices ranging from Linux servers to Cisco switches. It uses WinRM to communicate with Windows clients and servers.
SSH
https://docs.ansible.com/ansible/latest/user_guide/intro_getting_started.html
WinRM
https://docs.ansible.com/ansible/latest/user_guide/windows_winrm.html?highlight=winrm
Network Automation
https://docs.ansible.com/ansible/latest/network/index.html

SOURCE

https://www.gspann.com/resources/blogs/puppet-vs-chef-vs-ansible
Share:

Thursday, November 21, 2019

Which of the following are built-in functions in Microsoft SQL Server?

Which of the following are built-in functions in Microsoft SQL Server?

  • SUM, AVG, MULT, DIV, MIN
  • SUM, AVG, MIN, MAX, NAME
  • SUM, AVG, MIN, MAX, MULT
  • COUNT, SUM, AVG, MAX, MIN

EXPLANATION

COUNT, SUM, AVG, MAX, and MIN are all built-in functions in SQL.

In SQL a built-in function is a piece for programming that takes zero or more inputs and returns a value.  An example of a built-in functions is ABS(), which when given a value calculates the absolute (non-negative) value of the number.
Some
functions, such as ABS() are used to perform calculations, other such as GETDATE() are used to obtain a system value, such as the current data, or others, like LEFT(), are used to manipulate textual data.
Here is a simple query using the absolute value function.
SELECT Name,
       ABS(500 - ReorderPoint) ReorderPointDeviation
FROM   production.Product
WHERE  ABS(500 - ReorderPoint) > 200
In this query we first calculate the difference between 500 and a product’s reorder point.  The ABS function is then used to return the result as a positive number.
There are several things to note regarding functions.
  1. The inputs to a function are called parameters.  Not all function have parameters, and some functions have more than one.
  2. Parameters are enclosed in parenthesis.
  3. We use functions in the SELECT clause as well as WHERE filter condition. A function can be used anywhere in a SELECT statement that you can use an expression.
  4. Function are reserved words. I would avoid using them as column or table names.  If you do, then expect to qualify your names with brackets [].
As you learn more about functions you soon find they are vital in being able to calculate and manipulate your query results.  We’ll dig deeper into specific functions and their uses in future posts, but before we do so, let’s talk about the type of data a function can return.

Share:

After initial diagnostics and resource assignment, the startup BIOS program checks for secondary storage devices that contain the OS. The list of devices and the order they can be checked is found in the CMOS setup utility called:

After initial diagnostics and resource assignment, the startup BIOS program checks for secondary storage devices that contain the OS. The list of devices and the order they can be checked is found in the CMOS setup utility called:

  • Boot sequence
  • Power-on-self-test
  • Boot record
  • Partition table 
 After initial diagnostics and resource assignment, the startup BIOS program checks for secondary storage devices that contain the OS. The list of devices and the order they can be checked is found in the CMOS setup utility called:

EXPLANATION

The order in which the devices are listed is the order in which your computer will look for operating system information — in other words, the "boot order." With the boot order shown above, BIOS will first try to boot from any devices it considers "hard drives," which usually means the integrated hard drive that's in the computer.

To boot from the Windows disc, the CD-ROM or disc drive must be before the hard drive in the boot sequence. Tip Computers that give an option for a Boot Menu can use the menu to select what boot device to use.

 


Share:

Popular Posts