IT Questions and Answers :)

Wednesday, August 28, 2019

Which of the following definitions of PCL was defined by Hewlett-Packard?

Which of the following definitions of PCL was defined by Hewlett-Packard?

  • Posterior cruciate ligament
  • Point cloud library
  • Printer command language
  • Print capitalism language 
Which of the following definitions of PCL was defined by Hewlett-Packard?
 

EXPLANATION

 Short for Printer Command Language, PCL is the command language developed by Hewlett-Packard for its laser and inkjet printers.  PCL printer commands provide access to printer features. There are four general types of HP printer language commands:zcontrol codes zPCL commands zHP-GL/2 commands zPJL commandsControl CodesA control code is a character that initiates a printer function, for example Carriage Return (CR), Line Feed (LF), Form Feed (FF), etc












Share:

What does URL stand for?

What does URL stand for?

  • Unified Resource Link
  • Uniform Registered Link
  • Uniform Resource Link
  • Uniform Resource Locator 

What does URL stand for?

EXPLANATION

URL stands for uniform resource locator. A URL specifies the addresses of various network resources on the Internet. Examples of these resources are hypertext pages, images and sound files. A URL consists of two main parts: the protocol identifier and resource name. The protocol identifier specifies how information from the link is transferred.

Share:

Tuesday, August 27, 2019

Cloud computing is definitely not beneficial for which of the following?

Cloud computing is definitely not beneficial for which of the following?

  • Web site of a large newspaper
  • Email system for the Pentagon
  • Rapidly growing email system
  • Small engineering start-up 
Cloud computing is definitely not beneficial for which of the following?

EXPLANATION

Potential Drawbacks of Cloud Computing

Security and Availability

Security and availability are still the main concerns that most people have about relying on cloud-based services.
You've probably heard of the many high-profile news stories of security breaches in cloud-based services. Although you should certainly think about the implications of a breach in your organizational data, you should also consider that in both cloud-based and on-premises software, most security breaches are attributable to human error. That is one reason why we published our 12 Tips to Being Safer Online.
When thinking about cloud security and availability, you should also have a realistic sense of your current technology situation. Fears about the cloud are sometimes based on a utopian vision of an organization's current situation. Odds are that your security isn't perfect, you don't have 100 percent systems uptime, and you may not have staff resources dedicated to IT management. In the cloud, security and management are in the hands of trained, dedicated experts.

Cloud Vendors Going Out of Business

Cloud computing is still a quickly changing field, and there's always the danger that a new company might go out of business or radically change its service. A sudden change in service might not be too detrimental if you were only using the application for a one-time project, but it could be disastrous if you were using it for your entire donor database.
When evaluating cloud providers, find out what options you have for backing up and extracting your data. The best services allow you to download your data in a standard, nonproprietary format.

The Need for Reliable Internet Service

Finally, you will become more dependent on a good Internet connection if you rely on the cloud. As more mission-critical work is done on the Internet, organizations will need much more bandwidth and few, if any, failures in Internet connectivity. If consistent Internet access, connection speed, or bandwidth are problems for your organization, cloud solutions may not be right for you at this time.

Share:

Which of the following is not a typical business objective of IT outsourcing and cloud computing?

Which of the following is not a typical business objective of IT outsourcing and cloud computing?

  • Eliminating noncore activities
  • Improving cost structure
  • Lack of skilled staff
  • Solving security problems 

Which of the following is not a typical business objective of IT outsourcing and cloud computing?

EXPLANATION

Solving Security problems are not a typical reason for outsourcing or cloud adoption.
A, B, and C are incorrect. Eliminating noncore activities, a lack of internal skilled staff, and improving cost structure (CAPEX to OPEX) are all common reasons that companies choose to outsource or adopt cloud solutions. Remember that cloud computing is a form of outsourcing.

 

Share:

Which of the following is NOT specifically considered a cloud computing risk?

Which of the following is NOT specifically considered a cloud computing risk?

  • Loss of network connectivity
  • Host-based firewalls that you manage
  • Network latency
  • Data stored in the cloud 
Which of the following is NOT specifically considered a cloud computing risk?

EXPLANATION

I just answered that question and apparently I was wrong. 

Of the 4 answers provided, I selected "latency" for a variety of reasons, mostly because I felt it was the least wrong.  The item which was marked as "correct" is, in fact, a very big risk.
She would have been better off asking "Which of these is software?"
 * Loss of network connectivity    * Host-based firewalls that you manage
 * Network latency          * Data stored in the cloud
Given that the original comment on this question was posted on August 9th and today is August 30th, you've had 3 weeks to fix this question, Spiceworks, and yet it remains in circulation.  Are you all on a go-slow or do you just not understand how poor this question is?

https://community.spiceworks.com/topic/1759039-which-of-the-following-is-not-considered-a-cloud-computing-risk

 

Share:

How many wire pairs are required for Gigabit Ethernet?

How many wire pairs are required for Gigabit Ethernet?

  • 3
  • 4
  • 6


EXPLANATION

How many pairs of wire does gigabit ethernet use on utp cable?

4 pairs of wires.


Ethernet Cat 5 cables have eight wires (four pairs), but under 10BaseT and 100BaseT standards (10 Mbps and 100 Mbps, respectively) only four (two pairs) of these wires are actually used. One pair is used for transmitting data and the other pair is used for receiving data.
Pin Color  Function
1 White with Green +TD
2 Green -TD
3 White with Orange +RD
4 Blue Not Used
5 White with Blue Not Used
6 Orange -RD
7 White with Brown Not Used
8 Brown Not Used
Ethernet standard uses a technique against electromagnetic noise called cancellation. As electrical current is applied to a wire, it generates an electromagnetic field around the wire. If this field is strong enough, it can create electrical interference on the wires right next to it, corrupting the data that were being transmitted there. This problem is called crosstalk.



Share:

What command can you use to verify that a host computer can connect to the TCP/IP network and network resources?

What command can you use to verify that a host computer can connect to the TCP/IP network and network resources?

  • ping
  • tracert
  • netstat
  • nslookup 
What command can you use to verify that a host computer can connect to the TCP/IP network and network resources?

EXPLANATION

Testing Connections to Remote Servers

If you cannot connect to a remote server, there are two common tools that you can use. Use the PING command to verify that a host computer can connect to the TCP/IP network and network resources. Use the TRACERT command to examine the route taken to a destination.

To Test Connections by Using PING
You can use the PING command as a troubleshooting tool to sequentially test connectivity to various network resources. To "ping" a network host directly:

1. Click Start, click Run, type cmd in the Open box, and then press ENTER.
2.
Type one of the following lines, and then press ENTER, where IPAddressOfRemoteNetworkHost is the IP address of the computer that you want to connect to, and HostName is the name of the computer that you want to connect to:
  • ping IPAddressOfRemoteNetworkHostFor example, ping 192.168.104.
  • ping HostNameFor example, ping quiz.techlanda.com.
3.In the command prompt window, look for a reply that may look similar to the following:

Reply from 192.168.1.104: bytes=32 time=40ms TTL=61
Reply from 192.168.1.104: bytes=32 time=40ms TTL=61
Reply from 192.168.1.104: bytes=32 time=40ms TTL=61
Reply from 192.168.1.104: bytes=32 time=40ms TTL=61
If you receive a similar response, the server is available on the network. If you cannot contact the resource, you can troubleshoot the connection by using the PING command to test connectivity to various network resources:

a. Ping the loopback address to verify that TCP/IP is installed and working correctly on the local computer. To do so, type ping 127.0.0.1.
b. Ping the IP address of the local computer to verify that it was added to the network correctly.
c. Ping the IP address of the default gateway to verify that the gateway is functional and it is possible to connect to a local host on the local network. You can obtain the IP address of the local default gateway by using the IPCONFIG command.
d. Ping the IP address of another remote host to verify that you can communicate through a router.NOTE: To see additional options of the Ping.exe tool, type ping /? at the command prompt.
To Test Connections by Using Tracert.exe
loadTOCNode(3, 'summary');
Tracert.exe is a route-tracing utility that you can use to determine the network path to a destination. The TRACERT command shows the series of IP routers that are used to deliver packets from your computer to the destination and shows how long it takes for each hop. If packets cannot reach the destination, the TRACERT command returns the name of the last router that successfully forwarded the packets. To determine the path that a packet takes on the network and where that path may be ending:
1. Click Start, click Run, type cmd in the Open box, and then press ENTER.
2. At the command prompt, type tracert IPAddressOfRemoteNetworkHost, and then press ENTER, where IPAddressOfRemoteNetworkHost is the IP address of the remote network host.
3. Examine the results that appear in the window to determine the length of time that the packet took to reach each network segment and the point at which the connection may stop working.
NOTE: To see additional options of the Tracert.exe tool, type tracert /? at the command prompt.

 

Share:

Popular Posts