IT Questions and Answers :)

Wednesday, April 17, 2019

What does POST stand for ?

What does POST stand for ?

  • power of system test
  • Power on self tech
  • power on self test
  • power on storage test 

 
What does POST stand for ?

EXPLANATION

POST stands for "Power On Self Test." It is a diagnostic program built into the computer's hardware that tests different hardware components before the computer boots up. The POST process is run on both Windows and Macintosh computers.

which is what the computer firmware does when it is turned on, checking for the correct settings for the computer hardware.

Share:

What model do the terms, Session, Application Layer, Presentation Layer belong to?

What model do the terms, Session, Application Layer, Presentation Layer belong to?

  • SOI Model
  • Network and Connectivity Model
  • OSI Model
  • ISO Model 
What model do the terms, Session, Application Layer, Presentation Layer belong to?
 

EXPLANATION

  • Layer 7 - Application
  • Layer 6 - Presentation
  • Layer 5 - Session
  • Layer 4 - Transport
  • Layer 3 - Network
  • Layer 2 - Data Link
  • Layer 1 - Physical

 OSI network model, TCP/IP also has a network model. TCP/IP was on the path of development when the OSI standard was published and there was interaction between the designers of OSI and TCP/IP standards. The TCP/IP model is not same as OSI model.


OSI is a seven-layered standard, but TCP/IP is a four layered standard. The OSI model has been very influential in the growth and development of TCP/IP standard, and that is why much OSI terminology is applied to TCP/IP. The following figure compares the TCP/IP and OSI network models.


Share:

What tool can be used to identify listening ports and bindings?

What tool can be used to identify listening ports and bindings?

  • netstat
  • ntdsutil
  • nslookup
  • netsh 

 
What tool can be used to identify listening ports and bindings?

EXPLANATION

 netstat In computing, netstat is a command-line network utility tool that displays network connections for the Transmission Control Protocol, routing tables, and a number of network interface and network protocol statistics

ntdsutil is used to transfer FSMO roles.


nslookup is a network administration command-line tool available for many computer operating systems for querying the Domain Name System to obtain domain name or IP address mapping or for any other specific DNS record.

 In computing, netsh, or network shell, is a command-line utility included in Microsoft's Windows NT line of operating systems beginning with Windows 2000. It allows local or remote configuration of network devices such as the interface.

 


Share:

On the Web, what is a "dark pattern"?

On the Web, what is a "dark pattern"?

  • A subtle way to manipulate the user.
  • Another name for "dark mode".
  • A pattern that reveals hacker activity.
  • A type of encryption algorithm. 

On the Web, what is a "dark pattern"?

EXPLANATION

Dark pattern In graphic and web design, a dark pattern is "a user interface that has been carefully crafted to trick users into doing things, such as buying insurance with their purchase or signing up for recurring bills." The neologism dark pattern was coined by Harry Brignull in August 2010 with the registration of darkpatterns.org, a "pattern library with the specific goal of naming and shaming deceptive user interfaces."

SOURCE

https://www.quora.com/What-are-some-subtle-ways-that-people-manipulate-each-other

Share:

How many attempts does it take to plug in a USB flash drive?

How many attempts does it take to plug in a USB flash drive?

  • 2
  • 3
  • 1

How many attempts does it take to plug in a USB flash drive?

EXPLANATION

No Explanation for this question if your good at computer no second attempt is required to plug the thumb drive.

 


Share:

Which protocol is most reliable?

Which protocol is most reliable?

  • DHCP
  • UDP
  • IP
  • TCP
 
Which protocol is most reliable?

EXPLANATION

TCP is considered to be the most reliable connection. Both the sender and client check the connection and trust before making data transmission. UDP is not reliable. It does not authorize and check the connection.
UDP provides an unreliable connection. It does not authorize peer and not even check the connection before sending the data.

Share:

Popular Posts