IT Questions and Answers :)

Tuesday, January 16, 2018

What is the limiting factor that prevents older PCs from using a hard drive larger than 2.2 terabytes?

What is the limiting factor that prevents older PCs from using a hard drive larger than 2.2 terabytes?

  • GPT (GUID Partition Table)
  • MBR (Master Boot Record)
  • RAM (Random Access Memory)
  • UEFI (Unified EFI) 

 
What is the limiting factor that prevents older PCs from using a hard drive larger than 2.2 terabytes?

EXPLANATION

This limit arises from the maximum size of the master boot record (MBR) partitioning method used by most personal computers. BIOS systems with MBR disks use 32-bit values to describe the starting offset and length of a partition. Due to this size limit, MBR allows a maximum disk size of approximately 2.2 TB and a maximum of four primary partitions.
UEFI supports the GUID Partition Table (GPT), a more flexible partitioning scheme. GPT disks use 64-bit values to describe partitions, allowing larger partitions. GPT also fixes other issues related to MBR (data integrity, backup tables, maximum number of partitions, ...). Using 64-bit values, GPT can handle disks of up to 9.4 x 10^21 bytes or 9.4 zettabytes (ZB).

SOURCE

http://www.uefi.org/sites/default/files/resources/UEFI_Drive_Partition_Limits_Fact_Sheet.pdf
Share:

Friday, January 12, 2018

Which of the following protocols is not directly related to VOIP?

Which of the following protocols is not directly related to VOIP?

  • Real-time Transport Protocol (RTP)
  • Session Initiation Protocol (SIP)
  • File Transfer Protocol (FTP)
  • Inter-Asterisk eXchange (IAX) 

 
Which of the following protocols is not directly related to VOIP?

EXPLANATION


Voice over Internet Protocol (also voice over IP, VoIP or IP telephony) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet.
Voice over IP has been implemented in various ways using both proprietary protocols and protocols based on open standards. VoIP protocols include:
Session Initiation Protocol (SIP) H.323Media Gateway Control Protocol (MGCP) Gateway Control Protocol (Megaco, H.248) Real-time Transport Protocol (RTP) Real-time Transport Control Protocol (RTCP) Secure Real-time Transport Protocol (SRTP) Session Description Protocol (SDP) Inter-Asterisk eXchange (IAX) Jingle XMPP VoIP extensions Skype protocol

SOURCE

https://en.wikipedia.org/wiki/Voice_over_IP
Share:

What is Puppet used for?

What is Puppet used for?

  • Advanced threat management
  • Configuration management
  • Remote desktop operations
  • Backups and restores 

 
What is Puppet used for?

EXPLANATION

Puppet is an open-source configuration management tool that runs on Unix-like systems as well as on Microsoft Windows. It has its own declarative language that you can use to describe your system's configuration.
Share:

When a user computer or device (like a cell phone, tablet, or printer) is having general, odd software problems, what is the most common easy fix?

When a user computer or device (like a cell phone, tablet, or printer) is having general, odd software problems, what is the most common easy fix?

  • Turn it off and on again
  • Update the drivers
  • Attach a debugger to the port
  • Replace the flash memory 

 
When a user computer or device (like a cell phone, tablet, or printer) is having general, odd software problems, what is the most common easy fix?

EXPLANATION

Computerized devices have become extremely complex in software and hardware interactions.
The highly interwoven tangle of software dependencies will frequently cause small memory leaks, resource contentions, and other unexpected results, cascading over time. Just like a deep cleaning in the kitchen is great for a chef to maintain food quality, a reboot is oftentimes the quickest and easiest way to get a misbehaving system to clear its slate and get back into an operating state.
Sadly, since the concept is so simple and seems inane, many users will not do it when instructed. Performing this quick and basic step first thing will often correct the original issue and if it doesn't (and the user complains they did it already), it still provides the benefit of starting troubleshooting with the knowledge that you're starting from a basic system state.
Share:

Friday, January 5, 2018

Who is credited with developing the Virtual Integrated Network Service?

Who is credited with developing the Virtual Integrated Network Service?

  • ePresence
  • Unisys
  • IBM
  • Banyan Systems 

 
Who is credited with developing the Virtual Integrated Network Service?

EXPLANATION

In 1984, Banyan Systems introduced a set of network protocols and a computer network operating system known as Banyan VINES (Virtual Integrated Network Service). It was most commonly used by government entities, but later became obsolete as newer technologies from Microsoft and IBM began to overshadow its existing systems.
Share:

Thursday, January 4, 2018

Which of these is NOT a real Linux package manager?

Which of these is NOT a real Linux package manager?

  • Tuxbrew
  • PETget
  • Pacman
  • Conary 
Which of these is NOT a real Linux package manager?

 

EXPLANATION

Linux package managers are a dime a dozen and have lots of crazy names, like Pacman, PETget, and Conary.

Share:

Wednesday, January 3, 2018

Which of the Following is NOT a Sync Type when Syncing Files and Folders using SyncToy, FreeFileSync and other File Syncing Tools?

Which of the Following is NOT a Sync Type when Syncing Files and Folders using SyncToy, FreeFileSync and other File Syncing Tools?

  • Mirror
  •  Dedupe
  • Sync (Two-Way Sync)
  • Contribute (Update) 
Which of the Following is NOT a Sync Type when Syncing Files and Folders using SyncToy, FreeFileSync and other File Syncing Tools?

 EXPLANATION

Dedupe is a Storage Technology which operates on a block level to save storage space using pointers to data blocks. It is not a file level operation.
Contribute / Update -> Updates Files from the Left Folder Path to the Right without deleting any files or folders. Renamed, Modified and New Files and Folders are added from Left to Right.
Sync (Two-Way Sync) - New items, Renames, Modifications and Deletions are synced from Left to Right and Right to Left Paths (both directions).
Mirror - Copies and Overwrites all file and folder items from the Left Path to The Right Path - creates a mirror copy from Left to Right File Paths. Useful for Backups to removable storage such as USB External Hard Drives.

SOURCE

https://en.wikipedia.org/wiki/File_synchronization
Share:

Popular Posts