IT Questions and Answers :)

Friday, December 6, 2019

Which of the following is false?

Which of the following is false?

  • Backups are as useful as their restore strategy
  • Mission critical data is more important to backup
  • Automated backup is preferred over manual backups
  • Storing the backup copy locally is always better

EXPLANATION

  • Have At Least 3 Copies of the Data You Entail. Clearly, the more copies you have, the less risk of data loss you face. ...
  • Store Copies on Different Storage Media. ...
  • Keep One Copy Offsite. ...
  • MiniTool Software Performs Individual or Local Computer Backup. ...
  • Create the Third Copy to Offsite.
Share:

In SQL, what is a join?

In SQL, what is a join?

  • An operation that combines columns from one or more tables
  • An operation that connects two or more databases
  • The same thing as a foreign key.
  • The same thing as running a "Not-In"
In SQL, what is a join?

EXPLANATION

An SQL join clause - corresponding to a join operation in relational algebra - combines columns from one or more tables in a relational database. It creates a set that can be saved as a table or used as it is. A JOIN is a means for combining columns from one (self-join) or more tables by using values common to each.


The SQL Joins clause is used to combine records from two or more tables in a database. A JOIN is a means for combining fields from two tables by using values common to each. ... LEFT JOIN − returns all rows from the left table, even if there are no matches in the right table.
Share:

How does using the service password encryption command on a router provide additional security?

How does using the service password encryption command on a router provide additional security?

  • By requiring encrypted passwords for access
  • By configuring an MD5 encrypted key
  • By encrypting passwords in the plain text file
  • by encrypting all passwords passing through
How does using the service password encryption command on a router provide additional security?

EXPLANATION

By using this command, all the (current and future) passwords are encrypted. This command is primarily useful for keeping unauthorized individuals from viewing your password in your configuration file 

 

Share:

What is the term for a horizontal partition of data in a database or search engine?

What is the term for a horizontal partition of data in a database or search engine?

  • Hash
  • Shard
  • Schema
  • Row
What is the term for a horizontal partition of data in a database or search engine?

EXPLANATION

 A database shard is a horizontal partition of data in a database or search engine. Each individual partition is referred to as a shard or database shard. Each shard is held on a separate database server instance, to spread load.

Share:

What is the file extension ".csv" short for?

What is the file extension ".csv" short for?

  • Client SMTP validation
  • Computer system validation
  • Common short values
  • Comma separated values
What is the file extension ".csv" short for?

EXPLANATION

 CSV is a simple file format used to store tabular data, such as a spreadsheet or database. Files in the CSV format can be imported to and exported from programs that store data in tables, such as Microsoft Excel or OpenOffice Calc. CSV stands for "comma-separated values".

Share:

Which command can be used from a PC to verify the connectivity between hosts that connect through a switch in the same LAN?

Which command can be used from a PC to verify the connectivity between hosts that connect through a switch in the same LAN?

  • ping
  • traceroute
  • route
  • arp 
Which command can be used from a PC to verify the connectivity between hosts that connect through a switch in the same LAN?

EXPLANATION

The Ping utility is an online free tool that help you to verify if a domain/server is operating and network accessible. This Ping tool uses the Internet Control Message Protocol (ICMP) Echo function as detailed in RFC 792. A small packet will be sent through the network to a given IP address (IPv4) or host name.


Share:

What does the acronym RBAC stand for?

What does the acronym RBAC stand for?

  • Ribs Bacon And Chili
  • Role-Based Access Control
  • Remote Bind Access Code
  • Remote Bind Access Control 

What does the acronym RBAC stand for?

EXPLANATION

Role-based access control (RBAC) is a policy-neutral access-control mechanism defined around roles and privileges. The components of RBAC such as role-permissions, user-role and role-role relationships make it simple to perform user assignments.

Share:

Popular Posts