IT Questions and Answers :)

Thursday, November 23, 2017

In MS Exchange, which of the following is NOT an Exchange Recipient type?

In MS Exchange, which of the following is NOT an Exchange Recipient type?

  • Distribution mailbox
  • Room mailbox
  • Legacy mailbox
  • User mailbox 
In MS Exchange, which of the following is NOT an Exchange Recipient type?

 

EXPLANATION

The following are all Exchange Recipient types in MS Exchange.
User mailbox: This mailbox is created for an individual user to store mails, calendar items, contacts, tasks, documents, and other business data.

Linked mailbox: This mailbox is created for an individual user in a separate, trusted forest. For example AD account is created in A.COM and Mailbox is created in B.COM Exchange Server.

Shared mailbox: This mailbox is not primarily associated with a single user and is generally configured to allow logon access for multiple users.

Legacy mailbox: This mailbox is resides on a server running Exchange Server 2003 or Exchange 2000 Server. See here: https://support.microsoft.com/en-us/help/931747/a-mailbox-that-is-located-on-an-exchange-server-2007...

Room mailbox: This mailbox is created for a meeting location, such as a meeting or conference room, auditorium, or training room. When we create this mailbox, by default a disabled user object account is created.

Equipment mailbox: A resource mailbox is created for a non-location specific resource, such as a portable computer projector, microphone, or a company car. When we create this mailbox, by default a disabled user object account is created. Equipment mailboxes provide a simple and efficient way for users to use resources in manageable way.

SOURCE

https://technet.microsoft.com/en-us/library/bb201680(v=exchg.150).aspx
Share:

What was the Java programming language originally named?

What was the Java programming language originally named?

  • Oak
  • Green
  • Mocha
  • Blue 
What was the Java programming language originally named?

 

EXPLANATION

"The language was initially called Oak after an oak tree that stood outside Gosling's office. Later the project went by the name Green and was finally renamed Java, from Java coffee."

Related: History of programming languages:

SOURCE

http://www.javaworld.com/article/2077265/core-java/so-why-did-they-decide-to-call-it-java-.html
Share:

Which of the following is not a primary biometric authentication?

Which of the following is not a primary biometric authentication?

  • Body scanner
  • Voice
  • Fingerprint
  • Iris pattern 
Which of the following is not a primary biometric authentication?

 

EXPLANATION

Body scanners are soft biometrics. Soft biometrics traits are physical, behavioral or human characteristics that have been derived from the way human beings normally distinguish their peers (such as height, gender, and hair color). They are used to complement the identity information provided by the primary biometric identifiers .
https://en.wikipedia.org/wiki/Biometrics#Soft_biometrics 

Share:

In Hyper-V, which of the following features enables two VMs hosted on the same physical machine to communicate without going outside the host system?

In Hyper-V, which of the following features enables two VMs hosted on the same physical machine to communicate without going outside the host system?

  • Virtual LAN
  • Virtual Network
  • Virtual switch
  • Virtual PBX 
In Hyper-V, which of the following features enables two VMs hosted on the same physical machine to communicate without going outside the host system?

 

EXPLANATION

Hypervisors come with virtual switching capabilities, which enable the VMs to communicate without going outside of the host system. Depending on your hypervisor, this virtual switch can do everything you'd expect from a typical managed Layer 2 switch.

SOURCE

http://www.altaro.com/hyper-v/the-hyper-v-virtual-switch-explained-part-1/
Share:

Which of the following NoSQL databases is considered a document database?

Which of the following NoSQL databases is considered a document database?

  • Cassandra
  • Druid
  • MongoDB
  • HBase 

 
Which of the following NoSQL databases is considered a document database?

EXPLANATION

A NoSQL (originally referring to "non SQL" or "non relational") database provides a mechanism for storing and retrieving data which is modeled in means other than the tabular relations used in relational databases. MongoDB is document-oriented database, or document store, designed for storing, retrieving, and managing semi-structured data.. Cassandra, Druid, and HBase are column databases, a NoSQL object of the lowest level in a keyspace. It is a tuple consisting of three elements: unique name, value, and timestamp.

Share:

What is the decimal answer to the binary equation 10111110 + 01001101?

What is the decimal answer to the binary equation 10111110 + 01001101?

  • 247
  • 269
  • 198
  • 267 

 
What is the decimal answer to the binary equation 10111110 + 01001101?

EXPLANATION

190 + 77 = 267
For additional information on binary numbers: https://en.wikipedia.org/wiki/Binary_number
For how to convert binary numbers: http://www.wikihow.com/Convert-from-Decimal-to-Binary
 
Share:

What "bit" architecture did the Intel 8086 use?

What "bit" architecture did the Intel 8086 use?

  • 16
  • 32
  • 4

 
What "bit" architecture did the Intel 8086 use?

EXPLANATION

Intel 8086 microprocessor is a first member of x86 family of processors. Advertised as a "source-code compatible" with Intel 8080 and the Intel 8085 processors, the 8086 was not object code compatible with them. The 8086 has complete 16-bit architecture - 16-bit internal registers, 16-bit data bus, and 20-bit address bus (1 MB of physical memory). Because the processor has 16-bit index registers and memory pointers, it can effectively address only 64 KB of memory. To address memory beyond 64 KB the CPU uses segment registers - these registers specify memory locations for code, stack, data and extra data 64 KB segments. The segments can be positioned anywhere in memory, and, if necessary, user programs can change their position. This addressing method has one big advantage - it is very easy to write memory-independent code when the size of code, stack and data is smaller than 64 KB each. The complexity of the code and programming increases, sometimes significantly, when the size of stack, data and/code is larger than 64 KB. To support different variations of this awkward memory addressing scheme many 8086 compilers included 6 different memory models: tiny, small, compact, medium, large and huge. 64 KB direct addressing limitation was eliminated with the introduction of the 32-bit protected mode in intel 80386 Processor
Share:

Popular Posts