IT Questions and Answers :)

Friday, December 6, 2019

Which is not a layer of the OSI Model

Which is not a layer of the OSI Model

  • Presentation
  • Data Link
  • Packet
  • Transport
Which is not a layer of the OSI Model

EXPLANATION

 A network packet is a formatted unit of data carried by a packet-switched network. A packet consists of control information and user data, which is also known as the payload

A packet is a small amount of data sent over a network, such as a LAN or the Internet. Similar to a real-life package, each packet includes a source and destination as well as the content (or data) being transferred. When the packets reach their destination, they are reassembled into a single file or other contiguous block of data.
While the exact structure of a packet varies between protocols, a typical packet includes two sections — a header and payload. Information about the packet is stored in the header. For example, an IPv6 header includes the following fields:
  1. Source address (128 bits) - IPv6 address of the packet origin
  2. Destination address (128 bits) - IPv6 address of the packet destination
  3. Version (4 bits) - "6" for IPv6
  4. Traffic class (8 bits) - priority setting for the packet
  5. Flow label (20 bits) - optional ID that labels the packet as part of a specific flow; used to distinguish between multiple transmissions from a single origin
  6. Payload length (16 bits) - size of the data, defined in octets
  7. Next header (8 bits) - ID of the header following the current packet; may be TCP, UDP, or another protocol
  8. Hop limit (8 bits) - maximum number of network hops (between routers, switches, etc) before the packet is dropped; also known as "TTL" in IPv4
The payload section of a packet contains the actual data being transferred. This is often just a small part of a file, webpage, or other transmission, since individual packets are relatively small. For example, the maximum size of an IP packet payload is 65,535 bytes, or 64 kilobytes. The maximum size of an Ethernet packet or "frame" is only 1,500 bytes or 1.5 kilobytes.
Packets are intended to transfer data reliably and efficiently. Instead of transferring a large file as a single block of data, sending smaller packets helps ensure each section is transmitted successfully. If a packet is not received or is "dropped," only the dropped packet needs to be resent. Additionally, if a data transfer encounters network congestion due to multiple simultaneous transfers, the remaining packets can be rerouted through a less congested path.

 

Share:

How to show & hide invisible folders on macOS

How to show & hide invisible folders on macOS

  • control+command+space
  • shift+command+period [CMD + SHIFT + .
  • shift+option+i
  • option+command+period 
How to show & hide invisible folders on macOS

EXPLANATION

the command to show hidden files on Mac OS X, not to mention Googling for the command to then hide those hidden files a few minutes later.

Today I decided to make a short and easy to remember alias to speed up the process. All I need do now is type showFiles and hideFiles whenever I need to show/hide OS X’s hidden files. Here’s how you can do it too.

The Quickest Way to Show/Hide Hidden Files

Since the release of macOS Sierra, when in Finder, it is now possible to use the shortcut:
 CMD + SHIFT + .
Press once to show hidden files and again to hide them. If you’re using a version earlier than macOS Sierra, see Show/Hide Hidden Files using Terminal Aliases to setup a toggle command via terminal.

 


Share:

Which of the following is false?

Which of the following is false?

  • Backups are as useful as their restore strategy
  • Mission critical data is more important to backup
  • Automated backup is preferred over manual backups
  • Storing the backup copy locally is always better

EXPLANATION

  • Have At Least 3 Copies of the Data You Entail. Clearly, the more copies you have, the less risk of data loss you face. ...
  • Store Copies on Different Storage Media. ...
  • Keep One Copy Offsite. ...
  • MiniTool Software Performs Individual or Local Computer Backup. ...
  • Create the Third Copy to Offsite.
Share:

In SQL, what is a join?

In SQL, what is a join?

  • An operation that combines columns from one or more tables
  • An operation that connects two or more databases
  • The same thing as a foreign key.
  • The same thing as running a "Not-In"
In SQL, what is a join?

EXPLANATION

An SQL join clause - corresponding to a join operation in relational algebra - combines columns from one or more tables in a relational database. It creates a set that can be saved as a table or used as it is. A JOIN is a means for combining columns from one (self-join) or more tables by using values common to each.


The SQL Joins clause is used to combine records from two or more tables in a database. A JOIN is a means for combining fields from two tables by using values common to each. ... LEFT JOIN − returns all rows from the left table, even if there are no matches in the right table.
Share:

How does using the service password encryption command on a router provide additional security?

How does using the service password encryption command on a router provide additional security?

  • By requiring encrypted passwords for access
  • By configuring an MD5 encrypted key
  • By encrypting passwords in the plain text file
  • by encrypting all passwords passing through
How does using the service password encryption command on a router provide additional security?

EXPLANATION

By using this command, all the (current and future) passwords are encrypted. This command is primarily useful for keeping unauthorized individuals from viewing your password in your configuration file 

 

Share:

Popular Posts