IT Questions and Answers :)

Wednesday, July 11, 2018

In Linux, what's the difference between a hard link and a symbolic link?

In Linux, what's the difference between a hard link and a symbolic link?

  • A hard link does not depend on software libraries, a soft link does.
  • A hard link persists across OS reboots, a symbolic link does not.
  • Normal users can use only symbolic links, only the "root" user can use hard links.
  • A hard link points to a file's inode, a symbolic link is a pointer to the file. 

In Linux, what's the difference between a hard link and a symbolic link?

EXPLANATION

Symbolic links are much more common than hard links. They are aliases to an already existing file, and deleting the symbolic link will leave the existing file intact.
Renaming the file will break the link.  Hard links point to the very same filesystem inode used by the target file, so renaming the target file will have no effect on the hard link-- it will still point to the original file.  If for some reason the file targeted by a hard link is moved to a different spot in the filesystem, the hard link will no longer be valid.  Symbolic links are much more common than hard links.
Share:

Tuesday, July 10, 2018

In Crystal Reports, what type of Join statement lists values from all records of the right table and only records of the left table where the join fields match?

In Crystal Reports, what type of Join statement lists values from all records of the right table and only records of the left table where the join fields match?

  • Left Outer Join
  • Right Outer Join
  • Inner Join
  • Cross inner join 

In Crystal Reports, what type of Join statement lists values from all records of the right table and only records of the left table where the join fields match?

EXPLANATION

Right Outer Join lists all records from the right table and those in the left that match only.
Left Outer join lists all values from the left table and only those in the right table where the join fields match
Inner Join only shows values in the tables where the join fields match.
Cross Inner join is not a valid join type

SOURCE

http://us.flukecal.com/literature/technical-bulletins/metcal/application-note/setting-join-types-crystal-reports
Share:

Monday, July 9, 2018

Which of the following are Fax over IP Protocol(s)?

Which of the following are Fax over IP Protocol(s)?

  • t.38
  • H.323 and H.404
  • M.16 and M.204
  • k.30 and k.38 

 
Which of the following are Fax over IP Protocol(s)?

EXPLANATION

The T.38 fax relay standard was devised in 1998 as a way to permit faxes to be transported across IP networks between existing Group 3 (G3) fax terminals. T.4 and related fax standards were published by the ITU in 1980, before the rise of the Internet. In the late 1990s, VoIP, or Voice over IP, began to gain ground as an alternative to the conventional Public Switched Telephone Network. However, because most VoIP systems are optimized
(through their use of aggressive lossy bandwidth-saving compression) for voice rather than data calls, conventional fax machines worked poorly or not at all on them due to the network impairments such as delay, jitter, packet loss, and so on. Thus, some way of transmitting fax over IP was needed.

SOURCE

https://www.3cx.com/pbx/foip/
Share:

With Windows assigned software packages distributed via Group Policy (to computers), when are packages installed on endpoints?

With Windows assigned software packages distributed via Group Policy (to computers), when are packages installed on endpoints?

  • Randomly 15-60 minutes later
  • During windows updates
  • During their next reboot
  • During the user's next logon 

 
With Windows assigned software packages distributed via Group Policy (to computers), when are packages installed on endpoints?

EXPLANATION

You can assign a program distribution to users or computers. If you assign the program to a user, it is installed when the user logs on to the computer. When the user first runs the program, the installation is completed. If you assign the program to a computer, it is installed when the computer starts, and it is available to all users who log on to the computer. When a user first runs the program, the installation is completed.

SOURCE

https://technet.microsoft.com/en-us/library/cc753768(v=ws.11).aspx
Share:

Which is the correct method for defining a function in PHP

Which is the correct method for defining a function in PHP

  • function myFunction($arg_n) { return $retval; }
  • Function myFunction(p1) myFunction = (p1 - 32) End Function
  • int myFunction(int p1) { return p1; }
  • function myFunction(p1, p2) { return p1 * p2; } 

 
Which is the correct method for defining a function in PHP

EXPLANATION


Its very easy to create your own PHP function. Suppose you want to create a PHP function which will simply write a simple message on your browser when you will call it. Following example creates a function called writeMessage() and then calls it just after creating it.
Note that while creating a function its name should start with keyword function and all the PHP code should be put inside { and } braces as shown in the following example below −

<?php
    /* Defining a PHP Function */
    function writeMessage() {
    echo "You are really a nice person, Have a nice time!";
    }
         
    /* Calling a PHP Function */
    writeMessage();
?>

For more information check out: http://php.net/manual/en/functions.user-defined.phpThe other answers and their language is below:
function myFunction(p1, p2) { return p1 * p2; } is JavaScript
Function myFunction(p1) myFunction = (p1 - 32) End Function is VBScript
int myFunction(int p1) { return p1; } is C
Share:

With Windows assigned software packages distributed via Group Policy (to computers), when are packages installed on endpoints?

With Windows assigned software packages distributed via Group Policy (to computers), when are packages installed on endpoints?

  • Randomly 15-60 minutes later
  • During windows updates
  • During their next reboot
  • During the user's next logon 

 
With Windows assigned software packages distributed via Group Policy (to computers), when are packages installed on endpoints?

EXPLANATION

You can assign a program distribution to users or computers. If you assign the program to a user, it is installed when the user logs on to the computer. When the user first runs the program, the installation is completed. If you assign the program to a computer, it is installed when the computer starts, and it is available to all users who log on to the computer. When a user first runs the program, the installation is completed.

SOURCE

https://technet.microsoft.com/en-us/library/cc753768(v=ws.11).aspx
Share:

Which of the following is not a system role in vCenter?

Which of the following is not a system role in vCenter?

  • Administrator
  • Read Only
  • No Access
  • Virtual Machine User (Power User) 
Which of the following is not a system role in vCenter?

EXPLANATION

Virtual Machine User is a sample role on the vCenter system of permissions - No Access, Administrator and Read Only are the system roles which are not customizable.

SOURCE

https://pubs.vmware.com/vsphere-60/topic/com.vmware.ICbase/PDF/vsphere-esxi-vcenter-server-60-security-guide.pdf
Share:

Popular Posts