Monday, August 17, 2020
Friday, August 14, 2020
In a basic client program, which of the following UNIX system calls is used to create an endpoint for communication with a server program in C?
In a basic client program, which of the following UNIX system calls is used to create an endpoint for communication with a server program in C?
- socket()
- connect()
- fork()
- bind()
EXPLANATION
int sockfd;sockfd = socket(AF_INET, SOCK_STREAM, 0);
SOURCE
http://man7.org/linux/man-pages/man2/socket.2.htmlWednesday, August 12, 2020
If i wanted to find the Windows 10 Spotlight Lock Screen Pictures... Where would you find them?
If i wanted to find the Windows 10 Spotlight Lock Screen Pictures... Where would you find them?
- C:\Users\[USERNAME]\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager\LocalState\Asset
- C:\Windows\Web\Screen
- C:\Windows\Web\Wallpaper
- C:\ProgramData\Microsoft\Windows\SystemData
EXPLANATION
C:\Users\[USERNAME]\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager\LocalState\Asset is the correct answer... given 100 characters to work with. Since the backgrounds are downloaded, stored and overwritten.. they are stored here.C:\ProgramData\Microsoft\Windows\SystemData is where the lock screen can be changed or overwritten, given permission.
C:\Windows\Web\Screen is the location of the windows prelogin screen background.
And C:\Windows\Web\Wallpaper is where default windows 7 wallpapers for your desktop are saved.
SOURCE
https://www.laptopmag.com/articles/find-windows-10-lock-screen-picturesIn a cluster, what VMware vSphere feature allows a virtual machine to run a replica of itself on a different host to allow for seamless fail-over in case of host failure?
In a cluster, what VMware vSphere feature allows a virtual machine to run a replica of itself on a different host to allow for seamless fail-over in case of host failure?
- Distributed Resource Scheduler
- Fault Tolerance
- High Availability
- vMotion
EXPLANATION
With Fault Tolerance, a replica VM is created on a different host in the cluster to work in sync with the primary virtual machine on which Fault Tolerance is enabled. When host failure is detected,the replica VM takes place of the primary virtual machine with no downtime. This differs from High Availability in that the virtual machine is typically restarted on to another host, requiring downtime.
SOURCE
https://pubs.vmware.com/vsphere-60/index.jsp?topic=%2Fcom.vmware.vsphere.avail.doc%2FGUID-623812E6-D253-4FBC-B3E1-6FBFDF82ED21.htmlFriday, August 7, 2020
In linux, what command will output the 10 most recently created users?
In linux, what command will output the 10 most recently created users?
- last /etc/users
- tail /etc/passwd
- head /etc/passwd
- vim /etc/passwd
EXPLANATION
The "tail" command outputs the last 10 lines of the file that it is passed.Since Linux stores usernames in the order in which they were created in the file, /etc/passwd/, the command "tail /etc/passwd/" will return the 10 most recently created users
SOURCE
https://shapeshed.com/unix-tail/IRQ (Interrupt Request Line) 6 was commonly assigned to:
IRQ (Interrupt Request Line) 6 was commonly assigned to:
- Floppy drive controller
- LPT1
- Sound card
- Com1
EXPLANATION
IRQs ((Interrupt Request Line) are hardware lines over which devices can send interrupt signals to the microprocessor. When you add a new device to a PC, you sometimes need to set itsIRQ number by setting a DIP switch. This specifies which interrupt line the device may use.Prior to plug and play devices, users had to set IRQ values of devices manually when adding the device, such as a modem or printer, to a system.
The following list of IRQ numbers specifies what each of the 16 IRQ lines are used for.
IRQ 0System timerThis interrupt is reserved for the internal system timer. It is never available to peripherals or other devices.IRQ 1 KeyboardThis interrupt is reserved for the keyboard controller. Even on devices without a keyboard, this interrupt is exclusively for keyboard input.
IRQ 2 Cascade interrupt for IRQs 8-15This interrupt cascades the second interrupt controller to the first.
IRQ 3 Second serial port (COM2)The interrupt for the second serial port and often the default interrupt for the fourth serial port (COM4).
IRQ 4 First serial port (COM1)This interrupt is normally used for the first serial port. On devices that do not use a PS/2 mouse, this interrupt is almost always used by the serial mouse. This is also the default interrupt for the third serial port (COM3).
IRQ 5 Sound cardThis interrupt is the first choice that most sound cards make when looking for an IRQ setting.
IRQ 6 Floppy disk controllerThis interrupt is reserved for the floppy disk controller.
IRQ 7 First parallel portThis interrupt is normally reserved for the use of the printer. If a printer is not being used, this interrupt can be used for other devices that use parallel ports.
IRQ 8 Real-time clockThis interrupt is reserved for the system's real-time clock timer and can not be used for any other purpose.
IRQ 9 Open interruptThis interrupt is typically left open on devices for the use of peripherals.
IRQ 10 Open interruptThis interrupt is typically left open on devices for the use of peripherals.
IRQ 11 Open interruptThis interrupt is typically left open on devices for the use of peripherals.
IRQ 12 PS/2 mouseThis interrupt is reserved for the PS/2 mouse on machines that use one. If a PS/2 mouse is not used, the interrupt can be used for other peripherals, such as network card.
IRQ 13 Floating point unit/coprocessorThis interrupt is reserved for the integrated floating point unit. It is never available to peripherals or other devices as it is used exclusively for internal signaling.
IRQ 14 Primary IDE channelThis interrupt is reserved for use by the primary IDE controller. On systems that do not use IDE devices, the IRQ can be used for another purpose.
IRQ 15 Secondary IDE channelThis interrupt is reserved for use by the secondary IDE controller.
SOURCE
Wednesday, August 5, 2020
Given a subnet address of 10.1.129.0/25, what is the broadcast address?
Given a subnet address of 10.1.129.0/25, what is the broadcast address?
- 10.1.129.25
- 10.1.129.127
- 10.255.255.255
- 10.1.129.255
EXPLANATION
If we look at the address and subnet mask in binary, we can see the following:0000 1010 . 0000 0001 . 1000 0001 . 0000 0000
1111 1111 . 1111 1111 . 1111 1111 . 1000 0000
Looking at the last octet, we can see that there are 7 binary zeros. These indicate that we have 7 host bits. When you change all of those bits to ones, you end up with:
0000 1010 . 0000 0001 . 1000 0001 . 0111 1111
Converting back to decimal, we get:
10.1.129.127.
https://subnet.techlanda.com/