IT Questions and Answers :)

Friday, June 21, 2019

In .NET, which of the following is NOT a value type?

In .NET, which of the following is NOT a value type?

  • double
  • char
  • int
  • string

In .NET, which of the following is NOT a value type?

EXPLANATION

Main features of value types

A variable of a value type contains a value of the type. For example, a variable of the int type might contain the value 42. This differs from a variable of a reference type, which contains a reference to an instance of the type, also known as an object.
When you assign a new value to a variable of a value type, that value is copied. When you assign a new value to a variable of a reference type, the reference is copied, not the object itself.

Source

https://docs.microsoft.com/en-us/dotnet/csharp/language-reference/keywords/value-types

 

 
Share:

In which version of Windows Server was Microsoft IPAM first released?

In which version of Windows Server was Microsoft IPAM first released?

  • Windows Server 2012
  • Windows Server 2008
  • Windows Server 2012 R2
  • Windows Server 2003 
In which version of Windows Server was Microsoft IPAM first released?

EXPLANATION

 IPAM or IP Address Management is a solution introduced by Microsoft to Windows Server starting with 2012 which lets administrators manage their DHCP and DNS servers from a single console. Now that is a very simple explanation of the concept; IPAM can do a little more than just manage the servers like find available free addresses, view the address spaces from a single place, track an IP’s allocation by date and much more.

    This first post in the IPAM series will cover some basic topics regarding the product. In the next posts we will be installing it, configuring it and looking at some features. I am using Windows Server 2016 for the installation but most of the things are the same for 2012 and 2012 R2.
Share:

Which CSS property is used to hide an element and will not affect the layout?

Which CSS property is used to hide an element and will not affect the layout?

  • visibility: hidden;
  • display: none;
  • display: false;
  • visibility: false; 
Which CSS property is used to hide an element and will not affect the layout?

EXPLANATION

<!DOCTYPE html>
<html>
<head>
<style>
h2.a {
  visibility: visible;
}

h2.b {
  visibility: hidden;
}
</style>
</head>
<body>

<h1>The visibility Property</h1>

<h2 class="a">This heading is visible</h2>

<h2 class="b">This heading is hidden</h2>

<p>Notice that the hidden heading still takes up space on the page.</p>

</body>
</html>

 Output

The visibility Property

This heading is visible

Notice that the hidden heading still takes up space on the page.


Source

https://www.w3schools.com/CSSref/tryit.asp?filename=trycss_visibility

 

Share:

What event ID should you look for in Windows Logs - System to determine if your server has been shut down?

What event ID should you look for in Windows Logs - System to determine if your server has been shut down?

  • 44
  • 41
  • 12
  • 13 
What event ID should you look for in Windows Logs - System to determine if your server has been shut down?

EXPLANATION

The kernel power event ID 41 error occurs when the computer is shut down, or it restarts unexpectedly. When a computer that is running Windows starts, a check is performed to determine whether the computer was shut down cleanly. If the computer was not shut down cleanly, a Kernel Power Event 41 message is generated.

An event 41 is used to report that something unexpected happened that prevented Windows from shutting down correctly. There may be insufficient information to explicitly define what happened. To determine what may have happened and to identify a potential resolution, it is important to know what the computer was doing at the time just before the event occurred.

If event 41 is logged because power to the computer was interrupted, consider obtaining an uninterruptible power supply (UPS) such as a battery backup power supply. An underpowered or failing power supply may cause this behavior. For example, if you added RAM or additional devices or hard disks when this problem began, the power supply may cause the problem.


An event 41 can occur in the following scenarios.

Scenario 1: The computer restarts, and there is a Stop error BugcheckCode in the event data

When a Stop error occurs, the Stop error data is written in Event ID 41 as part of the additional event data. There may be the instances in which the Stop error code information cannot be written before the computer restarts or shuts down. Such instances are covered in scenario 3.


 Note
The BugcheckCode data in the event is written in decimal format instead of a more typical hexadecimal format. Therefore, the decimal value should be converted to a hexadecimal value.

If the Stop error BugcheckCode entry in the event ID data is not zero, you should convert the BugcheckCode value from decimal to hexadecimal. Most documentation on Stop error codes reference the code as a hexadecimal value instead of a decimal value. To do this, follow these steps:
  1. Click Start, and then type calc in the Search box.
  2. Click View, and then click Programmer.
  3. Make sure that the Dec option button is selected on the left side of calculator.
  4. Use the keyboard to enter the decimal value from the BugcheckCode value.
  5. Click the Hex option button on the left side of the calculator.

 

Share:

What is SAP HANA?

What is SAP HANA?

  • An in SSD Database Management System
  • An in Disk Database Management System
  • An in Memory Database Management System
  • An in Cloud Database Management System
What is SAP HANA?

EXPLANATION

SAP HANA is an in-memory, column-oriented, relational database management system developed and marketed by SAP SE.
Its primary function as database server is to store and retrieve data as requested by the applications. In addition, it performs advanced analytics (predictive analytics, spatial data processing, text analytics, text search, streaming analytics, graph data processing) and includes ETL capabilities as well as an application server.

SOURCE

https://en.wikipedia.org/wiki/SAP_HANA
Share:

Thursday, June 13, 2019

Apple is changing the default user shell to what replacement starting in macOS 10.15 Catalina?

Apple is changing the default user shell to what replacement starting in macOS 10.15 Catalina?

  • bash
  • tcsh
  • zsh
  • dash 

Apple is changing the default user shell to what replacement starting in macOS 10.15 Catalina?

EXPLANATION


Apple unveiled macOS Catalina yesterday with support for iPad apps and lots of new features, but a big change for developers and power users was missing from the on stage presentation. Starting with macOS Catalina, Macs will now use zsh as the default
login shell and interactive shell across the operating system. All newly created user accounts in macOS Catalina will use zsh by default. Bash will still be available, but Apple is signaling that developers should start moving to zsh on macOS Mojave or earlier in anticipation of bash eventually going away in macOS.
Apple hasn’t explained exactly why it’s making this change, but bash isn’t exactly a modern shell as it’s implemented in macOS, and a switch to something less aging makes a lot more sense for the company. Apple is stuck using version 3.2 of bash that has been licensed under GPLv2, as newer versions are licensed under GPLv3. Apple has kept clear of using GPLv3 packages in macOS as the license is generally more restrictive to companies like Apple that sign their own code and it includes explicit patent grants, too.
While a number of Mac developers have already moved on to even more modern shells like Fish, zsh is more compatible with Bourne shell (sh) and mostly compatible with bash. There’s a lot more flexible autocomplete with zsh, and if you’re interested in moving to zsh on macOS Mojave then there are plenty of helpful guides for getting the best terminal setup and getting used to zsh before bash is fully phased out.
Share:

What is the maximum password length allowed in Office 365?

What is the maximum password length allowed in Office 365?

  • 12 characters
  • 32 characters
  • 24 characters
  • 16 characters [Updated answer is 256]
What is the maximum password length allowed in Office 365?

EXPLANATION


Microsoft instead recommends:
  • An 8-character minimum password length (Azure AD/Office 365 has a maximum password length of 16 characters for cloud identities)
  • Remove character composition requirements (i.e. don't require combinations of uppercase, lowercase, numbers, special characters, etc)
  • No password expiration
  • Ban common passwords
  • Educate users to not re-use corporate passwords for other systems and apps
  • Enforce multi-factor authentication
  • Enable risk-based multi-factor authentication challenges

EXPLANATION

The limit used to be 16 characters but was recently increased by Microsoft.

SOURCE

https://techcommunity.microsoft.com/t5/Azure-Active-Directory-Identity/Removal-of-the-16-character-limit-for-passwords-in-Azure-AD/ba-p/565275
Share:

Popular Posts