IT Questions and Answers :)

Friday, May 17, 2019

Convert 100 from hexadecimal to decimal

Convert 100 from hexadecimal to decimal

  • 257
  • 256
  • 260
  • 264 

Convert 100 from hexadecimal to decimal

EXPLANATION

Decimal Number System (Base 10 number system)

The decimal number system is also called as Base 10 number system since it has 10 digits (0,1,2,3,4,5,6,7,8,9).
We use decimal number system for our day to day calculations. The primary reason why we use decimal system for our daily calculations is that we have 10 fingers.
Let’s understand why decimal number system is base 10 with an example.
Let’s take a number 132.
(132)10=(1102)+(3101)+(2100)=(1100)+(310)+(21)=132
Hexadecimal number system (Base 16 number system) works in a similar way.
Example:
(1F)16=(1161)+(F160)=(1161)+(151)=(31)10Thus, 1F in Hexadecimal is equal to 31 in decimal

Hexadecimal Number System (Base 16 number System)

Hexadecimal number system is one of the widely used number system by computer system designers and programmers. It is also called as base 16 number system because it has 16 digits (In case of decimal number system, it was 10 digits).

https://convert-calculate.com/convert/hexadecimal-to-decimal-converter/

































 





Share:

What does LED stand for?

What does LED stand for?

  • Lighted electronic display
  • Lower energy demand
  • Light-emitting diode
  • Light-emitting display 
What does LED stand for?

EXPLANATION

LED stands for "light emitting diode." A diode is an electrical component with two terminals which conduct the electricity only in one direction.

What does LED stand for: Light Emitting Diode. LED stands for Light Emitting Diode. LEDs began as exciting but expensive electronic components in the sixties, used in handheld calculators and other similar devices. Through research and development, LED technology advanced, became more efficient and less expensive, until it reached its current form.


Share:

When it comes to virtualization, what does VDI stand for?

When it comes to virtualization, what does VDI stand for?

  • Video display interface
  • Virtual device infrastructure
  • Virtual desktop interface
  • Virtual desktop infrastructure 

When it comes to virtualization, what does VDI stand for?

EXPLANATION

Desktop virtualization
Desktop virtualization is software technology that separates the desktop environment and associated application software from the physical client device that is used to access it.
What is VDI? Virtual Desktop Infrastructure , or VDI, refers to the process of running a user desktop inside a virtual machine that lives on a server in the datacenter. It's a powerful form of desktop virtualization because it enables fully personalized desktops for each user with all the security and simplicity of centralized management.

 

Share:

The majority of the Linux Kernel is written in which language?

The majority of the Linux Kernel is written in which language?

  • Perl
  • C++
  • C
  • Pascal 
The majority of the Linux Kernel is written in which language?

EXPLANATION

Programming language. The Linux kernel is written in the version of the C programming language supported by GCC (which has introduced a number of extensions and changes to standard C), together with a number of short sections of code written in the assembly language (in GCC's "AT&T-style" syntax) of the target architecture.

The Linux kernel is an open-source monolithic Unix-like computer operating system kernel. The Linux family of operating systems is based on this kernel and deployed on both traditional computer systems such as personal computers and servers, usually in the form of Linux distributions, and on various embedded devices such as routers, wireless access points, PBXes, set-top boxes, FTA receivers, smart TVs, PVRs, and NAS appliances.

 

Share:

What feature of IPSec ensures data integrity during transmission?

What feature of IPSec ensures data integrity during transmission?

  • Anti-replay
  • Non-repudiation
  • Encryption
  • Authentication 
 What feature of IPSec ensures data integrity during transmission?

EXPLANATION

Internet Protocol Security (IPSec)

Cisco IOS uses the industry-standard IPSec protocol suite to enable advanced VPN features. The PIX IPSec implementation is based on the Cisco IOS IPSec that runs in Cisco routers.
IPSec acts at the network layer, protecting and authenticating IP packets between a PIX Firewall and other participating IPSec devices (peers), such as other PIX Firewalls, Cisco routers, the Cisco Secure VPN Client, the VPN 3000 Concentrator series, and other IPSec-compliant products.
IPSec enables the following Cisco IOS VPN features:
  • Data confidentiality—The IPSec sender can encrypt packets before transmitting them across a network.
  • Data integrity—The IPSec receiver can authenticate packets sent by the IPSec sender to ensure that the data has not been altered during transmission.
  • Data origin authentication—The IPSec receiver can authenticate the source of the IPSec packets sent. This service is dependent upon the data integrity service.
  • Antireplay—The IPSec receiver can detect and reject replayed packets.

Share:

What does DNS stand for?

What does DNS stand for?

  • Domain Name Service
  • Destination Notation System
  • Domain Name System
  • Dynamic Naming Server 
What does DNS stand for?

EXPLANATION

Domain Name System
The Domain Name System is a hierarchical decentralized naming system for computers, services, or other resources connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating

 

Share:

Which authentication method uses a secret shared key to ensure authentication?

Which authentication method uses a secret shared key to ensure authentication?

  • Certificates
  • Kerberos v5
  • Windows Authentication
  • Pre-shared keys 
Which authentication method uses a secret shared key to ensure authentication?

EXPLANATION

In cryptography, a pre-shared key (PSK) is a shared secret which was previously shared between the two parties using some secure channel before it needs to be used.. Key. To build a key from shared secret, the key derivation function is typically used

Pre-Shared Keys in IPsec. The following section is related to site-to-site VPNs only and NOT to remote access VPNs. The pre-shared key is merely used for authentication, not for encryption! IPsec tunnels rely on the ISAKMP/IKE protocols to exchange the keys for encryption, etc.

 

Share:

Popular Posts