IT Questions and Answers :)

Friday, April 19, 2019

In a Windows environment, which command should you use in order to show the last time your machine was rebooted?

n a Windows environment, which command should you use in order to show the last time your machine was rebooted?

  • systeminfo | find "System Boot Time"
  • net stats workstation
  • uptime
  • systeminfo | find "System Uptime" 
n a Windows environment, which command should you use in order to show the last time your machine was rebooted?

EXPLANATION

systeminfo command is almost right what you need. On English Windows 7 you can also do:
systeminfo | find /i "Boot Time"
Or with the help of WMIC:


wmic os get lastbootuptime
The main difference between Windows 7 and Windows XP that in Windows 7 Microsoft can show only last boot up time. 






Share:

What is the maxiumum distance for a CAT5E Cable?

What is the maxiumum distance for a CAT5E Cable?

  • 11 Meters
  • Infinite
  • 100 Meters
  • 30 Meters 
What is the maxiumum distance for a CAT5E Cable?

EXPLANATION

1000BASE-T (also known as IEEE 802.3ab) is a standard for gigabit Ethernet over copper wiring.

Each 1000BASE-T network segment can be a maximum length of 100 meters (328 feet), and must use Category 5 cable or better (including Cat 5e and Cat 6).

 The standards for Cat 5e and Cat 6 call for a maximum run length of 90 meters or 295 feet. While you may make a longer run and get it to work, this is not recommended. Even if problems don't show up immediately, they may come up later as your computers are upgraded to transmit faster or your network is expanded. If you must make a longer run, you can either put a signal repeater in the middle of the line or you can make your long run with fiber optic cable.
If your run is between 295 and 590 feet, the repeater option may be the best option for you. A switch or hub will act as a repeater. Make sure that you locate it in such a way that both runs on either side of the repeater are within the 90 meter standard. It won't do much good to split a 500 foot run into two runs of 100 and 400 feet.

If your run is longer than 590 feet or if most of the run is outside, fiber optic may be your best option. You'll need a media converter or fiber fed switch at each end of the fiber run to convert your network signals back and forth between electrical signals on copper and light pulses on fiber. If you are running fiber optic cable underground, you'll need to protect the delicate glass fibers inside the jacket by running it through a conduit or by using armored fiber optic cable.
Share:

What are the two most common distance-vector routing protocols?

What are the two most common distance-vector routing protocols?

  • RIP and BGP
  • IS-IS and BGP
  • BGP and IGRP
  • RIP and OSPF 
What are the two most common distance-vector routing protocols?


EXPLANATION

 Distance vector routing is so named because it involves two factors: the distance, or metric, of a destination, and the vector, or direction to take to get there. Routing information is only exchanged between directly connected neighbors. This means a router knows from which neighbor a route was learned, but it does not know where that neighbor learned the route; a router can't see beyond its own neighbors. This aspect of distance vector routing is sometimes referred to as "routing by rumor." Measures like split horizon and poison reverse are employed to avoid routing loops.

Link-state routing, in contrast, requires that all routers know about the paths reachable by all other routers in the network. Link-state information is flooded throughout the link-state domain (an area in OSPF or IS-IS) to ensure all routers posses a synchronized copy of the area's link-state database. From this common database, each router constructs its own relative shortest-path tree, with itself as the root, for all known routes.
http://packetlife.net/blog/2008/oct/2/distance-vector-versus-link-state/

Routing protocols can be classified into different groups according to their characteristics. Specifically, routing protocols can be classified by their:

Purpose: Interior Gateway Protocol (IGP) or Exterior Gateway Protocol (EGP)
Operation: Distance vector protocol, link-state protocol, or path-vector protocol
Behavior: Classful (legacy) or classless protocol
For example, IPv4 routing protocols are classified as follows:

RIPv1 (legacy): IGP, distance vector, classful protocol
IGRP (legacy): IGP, distance vector, classful protocol developed by Cisco (deprecated from 12.2 IOS and later)
RIPv2: IGP, distance vector, classless protocol
EIGRP: IGP, distance vector, classless protocol developed by Cisco
OSPF: IGP, link-state, classless protocol
IS-IS: IGP, link-state, classless protocol
BGP: EGP, path-vector, classless protocol
The classful routing protocols, RIPv1 and IGRP, are legacy protocols and are only used in older networks. These routing protocols have evolved into the classless routing protocols, RIPv2 and EIGRP, respectively. Link-state routing protocols are classless by nature.

 

Share:

Thursday, April 18, 2019

Which term is used to describe an organization's presence or account on Office 365

Which term is used to describe an organization's presence or account on Office 365

  • License
  • Account
  • Subscription
  • Tenant

Which term is used to describe an organization's presence or account on Office 365

EXPLANATION

Our tenant inside of Office 365 is going to represent, well, sort of like our subscription or our account for our entire company that we're going to manage our entire organization through. The reason we don't call it a subscription or an account is because those phrases have very particular meanings inside of Office 365.
So they had to come up with a better name for it
 tenant makes quite a bit of sense if you think about it. Setting up a tendency as sort of like moving into an apartment complex, the Office 365 data center apartment complex. Yeah, you're going to be there with all of your stuff, all of your data, but you're only going to have access to management over your little apartment, your one little piece of that apartment complex.
Everyone else who's also using Office 365 is going to be there as well, with control over their little piece of it, and you're all going to share the baseline infrastructure that's underneath. So you are like a tenant in the Office 365 data center. Setting it up is really easy to do.
copied from
Microsoft-Office-365-identities-and-requirements-70-346

SOURCE

https://www.microsoftpressstore.com/articles/article.aspx?p=2419713
 
Share:

Which Port is used for Citrix Session Reliability?

Which Port is used for Citrix Session Reliability?

  • 2589
  • 2927
  • 2729
  • 2598

Which Port is used for Citrix Session Reliability?

EXPLANATION

Citrix Session Reliability allows or prevents sessions to remain open during a loss of network connectivity. Session reliability, along with auto client reconnection, allows users to automatically
reconnect to their Citrix Receiver sessions after recovering from network disruptions.

SOURCE

https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-15-ltsr/policies/reference/ica-policy-settings/session-reliability-policy-settings.html
 
Share:

Which one is that does not provide high availability features in Windows Servers?


Which one is that does not provide high availability features in Windows Servers?

  • Live Migration
  • Network Load Balancing
  • Failover Clustering
  • SAML -Single sign on solution

 Which one is that does not provide high availability features in Windows Servers?

EXPLANATION

Live migration

Live migration refers to the process of moving a running virtual machine or application between different physical machines without disconnecting the client or application. Memory, storage, and network connectivity of the virtual machine are transferred from the original guest machine to the destination.

Network Load Balancing

Network load balancing is the ability to balance traffic across two WAN links without using complex routing protocols like BGP.
Failover clusters also provide Cluster Shared Volume (CSV) functionality that provides a consistent, distributed namespace that clustered roles can use to access shared storage from all nodes. With the Failover Clustering feature, users experience a minimum of disruptions in service.

Security Assertion Markup Language (SAML) is a standard protocol for web browser Single Sign-On (SSO) using secure tokens. SAML completely eliminates all passwords and instead uses standard cryptography and digital signatures to pass a secure sign-in token from an identity provider to a SaaS application. If you are an IT administrator, SAML can help you securely eliminate passwords and deploy applications much faster. If you are an application vendor, SAML can help you secure your application, reduce development costs and reach greater and faster adoption.
Share:

SQL is an acronym for what?


SQL is an acronym for what?

  • Sortable Quota List
  • Standard Query Language
  • Simple Query Logic
  • Structured Query Language



EXPLANATION

SQL is a domain-specific language used in programming and designed for managing data held in a relational database management system, or for stream processing in a relational data stream management system. It is particularly useful in handling structured data where there are relations between different entities/variables of the data 

SQL (/ˌɛsˌkjuːˈɛl/ ( listen) S-Q-L, /ˈsiːkwəl/ "sequel"; Structured Query Language) is a domain-specific language used in programming and designed for managing data held in a relational database management system (RDBMS), or for stream processing in a relational data stream management system (RDSMS).

SOURCE
https://en.wikipedia.org/wiki/SQL
Share:

Popular Posts