IT Questions and Answers :)

Friday, August 2, 2019

Which of these is NOT a way that cloud architecture is different from a traditional architecture?

Which of these is NOT a way that cloud architecture is different from a traditional architecture?

  • Cloud manages and handles dynamic workloads
  • Cloud provides hardware on demand
  • Cloud scales resources on demand
  • Cloud tightly couples the client and server 

Which of these is NOT a way that cloud architecture is different from a traditional architecture?

EXPLANATION

 The cloud architecture is different from the traditional hosting in many ways.

1. In cloud architecture, the server hardware is provided and maintenance to it is done by the service provider.
2. Users can draw the services they require over the internet eliminating the need to purchase any new hardware.
3. Users pay for the services they use. It does away the need to pay any fixed monthly plan fee as in traditional hosting. It also ensures users do not have to buy resources they do not require and leave them un-utilized.
4. Cloud architecture is scalable on demand. Users can increase or decrease their resources depending on their business needs with just a few clicks without the need of any physical effort as in traditional hosting.
5. Cloud hosting is capable of handling workloads seamlessly without any possibility of failure. Since it functions as a network, even if there is a failure in one of the components, the services are available from the other active components.
6. Cloud offers better data security and recovery from any natural disasters and human errors as it backs up data over multiple locations.
Share:

Which of the following is not a cloud computing deployment model?

Which of the following is not a cloud computing deployment model?

  • Hybrid cloud
  • Commercial cloud
  • Public cloud
  • Private cloud 


EXPLANATION

Cloud Computing Deployment Models

Cloud deployment models indicate how the cloud services are made available to users. The four deployment models associated with cloud computing are as follows:
Public cloud As the name suggests, this type of cloud deployment model supports all users who want to make use of a computing resource, such as hardware (OS, CPU, memory, storage) or software (application server, database) on a subscription basis. Most common uses of public clouds are for application development and testing, non-mission-critical tasks such as file-sharing, and e-mail service.
Private cloud True to its name, a private cloud is typically infrastructure used by a single organization. Such infrastructure may be managed by the organization itself to support various user groups, or it could be managed by a service provider that takes care of it either on-site or off-site. Private clouds are more expensive than public clouds due to the capital expenditure involved in acquiring and maintaining them. However, private clouds are better able to address the security and privacy concerns of organizations today.
Hybrid cloud In a hybrid cloud, an organization makes use of interconnected private and public cloud infrastructure. Many organizations make use of this model when they need to scale up their IT infrastructure rapidly, such as when leveraging public clouds to supplement the capacity available within a private cloud. For example, if an online retailer needs more computing resources to run its Web applications during the holiday season it may attain those resources via public clouds.
Community cloud This deployment model supports multiple organizations sharing computing resources that are part of a community; examples include universities cooperating in certain areas of research, or police departments within a county or state sharing computing resources. Access to a community cloud environment is typically restricted to the members of the community.
With public clouds, the cost is typically low for the end user and there is no capital expenditure involved. Use of private clouds involves capital expenditure, but the expenditure is still lower than the cost of owning and operating the infrastructure due to private clouds' greater level of consolidation and resource pooling. Private clouds also offer more security and compliance support than public clouds. As such, some organizations may choose to use private clouds for their more mission-critical, secure applications and public clouds for basic tasks such as application development and testing environments, and e-mail services.





Share:

Who is considered the father of the World Wide Web?

Who is considered the father of the World Wide Web?

  • Charles Babbage
  • Al Gore
  • Vint Cerf
  • Sir Tim Burners-Lee 
Who is considered the father of the World Wide Web?
 

EXPLANATION

The World Wide Web, commonly known as the Web, is an information system where documents and other web resources are identified by Uniform Resource Locators, which may be interlinked by hypertext, and are accessible over the Internet.  

Tim Berners-Lee's vision of a global hyperlinked information system became a possibility by the second half of the 1980s.[8] By 1985, the global Internet began to proliferate in Europe and the Domain Name System (upon which the Uniform Resource Locator is built) came into being. In 1988 the first direct IP connection between Europe and North America was made and Berners-Lee began to openly discuss the possibility of a web-like system at CERN.[9]

 

 

Share:

Which of the programming languages listed is not C based?

Which of the programming languages listed is not C based?

  • Squirrel
  • COBOL
  • Java
  • Python 
Which of the programming languages listed is not C based?

EXPLANATION

COBOL is a compiled English-like computer programming language designed for business use. It is imperative, procedural and, since 2002, object-oriented. COBOL is primarily used in business, finance, and administrative systems for companies and governments.

List of C-family programming languages

https://en.wikipedia.org/wiki/List_of_C-family_programming_languages


Share:

What is Layer 3 of the OSI Model?

What is Layer 3 of the OSI Model?

  • Application
  • Network
  • Session
  • Transport 
What is Layer 3 of the OSI Model?

EXPLANATION

 Layers of OSI Model
  • Physical Layer (Layer 1)
  • Data Link Layer (DLL) (Layer 2)
  • Network Layer (Layer 3)
  • Transport Layer (Layer 4)
  • Session Layer (Layer 5)
  • Presentation Layer (Layer 6)
  • Application Layer (Layer 7)

 

Share:

Which is a class B IP address?

Which is a class B IP address?

  • 128.XXX.XXX.XXX
  • 27.XXX.XXX.XXX
  • 223.XXX.XXX.XXX
  • 102.XXX.XXX.XXX 


EXPLANATION

IP address classes

With an IPv4 IP address, there are five classes of available IP ranges: Class A, Class B, Class C, Class D and Class E, while only A, B, and C are commonly used. Each class allows for a range of valid IP addresses, shown in the following table.
Class Address range Supports
Class A1.0.0.1 to 126.255.255.254Supports 16 million hosts on each of 127 networks.
Class B128.1.0.1 to 191.255.255.254Supports 65,000 hosts on each of 16,000 networks.
Class C192.0.1.1 to 223.255.254.254Supports 254 hosts on each of 2 million networks.
Class D224.0.0.0 to 239.255.255.255Reserved for multicast groups.
Class E240.0.0.0 to 254.255.255.254 Reserved for future use, or research and development purposes.
Ranges 127.x.x.x are reserved for the loopback or localhost, for example, 127.0.0.1 is the loopback address. Range 255.255.255.255 broadcasts to all hosts on the local network.

 

Share:

Is NTFRS required for LDAP to function on Windows Server 2003?

Is NTFRS required for LDAP to function on Windows Server 2003?

  • No
  • Yes
  • No, DFS is used by default and NTFRS is depreciate
  • Both NTFRS and DFS is needed for LDAP to function 

EXPLANATION

File Replication Service (FRS) is a Microsoft Windows Server service for distributing shared files and Group Policy Objects. It replaced the (Windows NT) Lan Manager Replication service,[1] and has been partially replaced by Distributed File System Replication. It is also known as NTFRS after the name of the executable file that runs the service.
One of the main uses of FRS is for the SYSVOL directory share. The SYSVOL directory share is particularly important in a Microsoft network as it is used to distribute files supporting Group Policy and scripts to client computers on the network. Since Group Policies and scripts are run each time a user logs on to the system, it is important to have reliability. Having multiple copies of the SYSVOL directory increases the resilience and spreads the workload for this essential service.
The SYSVOL directory can be accessed by using a network share to any server that has a copy of the SYSVOL directory (normally a Domain Controller) as shown below:
  \\server\SYSVOL
Or by accessing it using the domain name:
  \\domain.com\SYSVOL
Servers that work together to provide this service are called Replication Partners.
To control file replication:
  1. Use the Active Directory Sites and Services from Administrative Tools.
  2. Select the Sites container to view a list of sites.
  3. Expand the site that to be viewed. This will provide the list of servers in that site.
  4. Expand the server to be viewed, right click the NTDS settings, and select Properties.
  5. Under the Connections tab, the list of servers that are being replicated can be seen.

 


Share:

Popular Posts