IT Questions and Answers :)

Monday, May 7, 2018

In vSphere, what technology is used to perform a live migration of a VM to another host?

In vSphere, what technology is used to perform a live migration of a VM to another host?

  • Replication
  • VMotion
  • Cloning
  • Snapshots 

 
In vSphere, what technology is used to perform a live migration of a VM to another host?

EXPLANATION




VMware VMotion enables the live migration of running virtual machines from one physical server to another with no downtime, continuous service availability, and complete transaction integrity. It is transparent to users.



 www.mosaictec.com/tessera/what-is-vmotion.htm

Share:

Saturday, May 5, 2018

Which layer of the OSI model is responsible for managing and terminating the connections between the local and remote application?

Which layer of the OSI model is responsible for managing and terminating the connections between the local and remote application?

  • Application layer
  • Network layer
  • Data link layer
  • Session layer 

Which layer of the OSI model is responsible for managing and terminating the connections between the local and remote application?

EXPLANATION

The session layer controls the dialogues (connections) between computers.
It establishes, manages and terminates the connections between the local and remote application.
Share:

Thursday, May 3, 2018

In a Unix environment, what is a daemon?

In a Unix environment, what is a daemon?

  • A multicore processor type for Linux OS
  • A type of virus or malware
  • A different user interface or desktop
  • A program that runs as a background process

 
In a Unix environment, what is a daemon?

EXPLANATION

Wikipedia entry: A daemon is a computer program that runs as a background process,
rather than being under the direct control of an interactive user.
Share:

Cloud solutions that can tolerate failures yet still provide service are referred to as what?

Cloud solutions that can tolerate failures yet still provide service are referred to as what?

  • IaaS
  • Highly portable
  • PaaS
  • Highly available 

Cloud solutions that can tolerate failures yet still provide service are referred to as what?

EXPLANATION

High availability ensures that cloud solutions are always accessible.
This means eliminating single points of failure, such as storing data on a single hard disk or single network connections.
Share:

Tuesday, May 1, 2018

A user can receive email but cannot send any. Which protocol, responsible for sending email, is potentially not configured properly?

A user can receive email but cannot send any. Which protocol, responsible for sending email, is potentially not configured properly?

  • SNMP
  • FTP
  • POP3
  • SMTP

A user can receive email but cannot send any. Which protocol, responsible for sending email, is potentially not configured properly?

EXPLANATION

The simple mail transfer protocol (SMTP) is probably not configured properly.
When troubleshooting, you need to confirm the SMTP setting because it is responsible for sending mail. POP3 receives mail, so wouldn't be responsible for the send issue, unless you are using Outlook (where POP3 authentication is required before email can be sent over SMTP). FTP sends files to remote computers and SNMP is used to manage networks.
FTP and SNMP are not responsible for users sending or receiving email.

SOURCE

http://searchexchange.techtarget.com/definition/SMTP
Share:

Monday, April 30, 2018

Computers need to maintain certain settings (for example, date, time, some hardware settings, etc.) even when they are completely powered off. Such settings are used at start-up (among other uses). Where are these settings stored and maintained?

Computers need to maintain certain settings (for example, date, time, some hardware settings, etc.) even when they are completely powered off. Such settings are used at start-up (among other uses). Where are these settings stored and maintained?

  • In the BIOS
  • In Zone 0 of the hard drive
  • In the CMOS
  • In the Operating System 

 
Computers need to maintain certain settings (for example, date, time, some hardware settings, etc.) even when they are completely powered off. Such settings are used at start-up (among other uses). Where are these settings stored and maintained?

EXPLANATION

CMOS, which stands for "Complementary Metal-Oxide Semiconductor", is a battery-powered semiconductor chip that stores information such as date, time and certain hardware settings. A tiny battery, similar to a watch battery, is what allows the CMOS to maintain information while the machine is powered off. As they are typically designed to last about ten years, and since most computers get scrapped before then, this is why you probably haven't had to replace many CMOS batteries.


While the BIOS uses data from the CMOS, these are two separate things. See the following for more information on the difference between the two and how they work together: http://www.computerhope.com/issues/ch001360.htm

Share:

Saturday, April 28, 2018

How many kibibytes (KiB) are in 1 tebibyte (TiB)?

How many kibibytes (KiB) are in 1 tebibyte (TiB)?

  • 1,073,741,824 KiB
  • 1,048,576 KiB
  • 10,240,000,000 KiB
  • 1,000,000 KiB 

 
How many kibibytes (KiB) are in 1 tebibyte (TiB)?

EXPLANATION

The interpretation of the older term "kilobyte" to denote 1024 bytes, conflicting with the SI definition of the prefix kilo (1000), is still common, mostly in informal computer science contexts
1 kibibyte = 1,024 bytes
1 mebibyte = 1,024 kibibytes
1 gibibyte = 1,024 mebibytes = 1,048,576 kibibytes
1 tebibyte = 1,024 gibibytes = 1,048,576 mebibytes = 1,073,741,824 kibibytes
https://en.wikipedia.org/wiki/Kibibyte

SOURCE

https://en.wikipedia.org/wiki/Kibibyte
Share:

Popular Posts