IT Questions and Answers :)

Monday, April 22, 2019

In Windows, what is the run command to bring up programs/apps list?

In Windows, what is the run command to bring up programs/apps list?

  • appwiz.cpl
  • appwiz.msc
  • appmgr.cpl
  • appmgr.dll 


EXPLANATION

Appwiz.cpl is a Windows shortcut that allows you to launch the installed programs window without going through the Control Panel. The installed programs window contains programs and applications that you can uninstall and remove safely without damaging your computer.

Share:

Which is NOT a supported version of .NET Framework on any release of Exchange 2019?

Which is NOT a supported version of .NET Framework on any release of Exchange 2019?

  • .NET Framework 4.7.1
  • .NET Framework 4.5
  • All of them
  • .NET Framework 4.6.2 

Which is NOT a supported version of .NET Framework on any release of Exchange 2019?

EXPLANATION

.NET Framework

We strongly recommend that you use the latest version of the .NET Framework that's supported by the release of Exchange you're installing.

Important

Releases of .NET Framework that aren't listed in the table below aren't supported on any release of Exchange 2019. This includes minor and patch-level releases of .NET Framework.

Exchange version .NET Framework 4.7.2
Exchange 2019 Supported

Share:

What does IT stand for in IT Administrator ?

What does IT stand for in IT Administrator ?

  • Information Technology
  • Integrated Timeline
  • Income Tax
  • Industrial Trainee 

 What does IT stand for in IT Administrator ?

EXPLANATION

Income tax
An income tax is a tax imposed on individuals or entities that varies with respective income or profits. Income tax generally is computed as the product of a tax rate times taxable income. Taxation rates may vary by type or characteristics of the taxpayer.
 
Information technology
Information technology is the use of computers to store, retrieve, transmit, and manipulate data, or information, often in the context of a business or other enterprise. IT is considered to be a subset of information and communications technology.

 

Share:

Which of the following is Stack structure?

Which of the following is Stack structure?

  • LILO (Last In Last Out)
  • FILO (First In Last Out)
  • LIFO (Last In First Out)
  • LIFO (Last In First Out) 
Which of the following is Stack structure?

EXPLANATION

 Stack Stands for "First In, Last Out." FILO is an acronym used in computer science to describe the order in which objects are accessed. It is synonymous with LIFO (which is more commonly used) and may also be called LCFS or "last come, first served."

A stack is a typical data structure that may be accessed using the LIFO method. In a stack, each item is placed on top of the previous item, one at a time. Items can be removed from either the top of the stack (FILO) or from the bottom of the stack FIFO.
You can imagine a FILO stack as the paper in a printer tray. Whatever paper you place on top of the existing paper in the input tray will be accessed first.
FILO is not necessarily a "fair" way to access data, since it operates in opposite order of a queue. Still, the FILO method can be useful for retrieving recently used objects, such as those stored in cache memory.
Share:

OSI model is having how many layers?

OSI model is having how many layers?

  • 7
  • 6
  • 2
 OSI model is having how many layers?

EXPLANATION

The Open Systems Interconnection model is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to its underlying internal structure and technology. Its goal is the interoperability of diverse communication systems with standard protocols. The model partitions a communication system into abstraction layers. The original version of the model defined seven layers.

Share:

Which Microsoft product was code named Snowball?

Which Microsoft product was code named Snowball?

  • Windows 95
  • Windows Vista
  • Windows Server 2016
  • Windows For Workgroups 3.11 
 Which Microsoft product was code named Snowball?


EXPLANATION

Operating systems

Windows 3.1x and 9x

Codename Preliminary name Final name Notes Ref
Janus N/A Windows 3.1 N/A [2][3]
Sparta, Winball Windows Plus Windows for Workgroups 3.1 Windows 3.1 (16-bit) with enhanced networking; designed to work particularly well as a client with the new Windows NT. [4][5]
Snowball Windows for Workgroups 3.10 Windows for Workgroups 3.11 Although this release was still 16-bit Windows, it included a 32-bit TCP/IP stack (when running on compatible hardware). Along with Win32s, this was one of the first steps towards moving the Windows desktop to a 32-bit code base. [6]
Chicago Windows 4.0 Windows 95 For codenames of some of the internal components of Windows 95, see "Jaguar", "Cougar", "Panther" and "Stimpy" under § OS components. [7][8]
Detroit Windows 4.1 Windows 95 OSR 2 Named after Detroit, Michigan. A writer for Maximum PC suggested that "Detroit" and other Windows 95-era names were answers to the question posed by Microsoft's "Where do you want to go today?" marketing campaign. [9]
Nashville Windows 96 N/A Cancelled upgrade for Windows 95; sometimes referred to in the press as Windows 96. Codename was reused for Internet Explorer 4.0 and Windows Desktop Update which incorporated many of the technologies planned for Nashville. [10][11]
Memphis Windows 97, Windows 4.1 Windows 98 N/A [12]
Millennium Windows 4.9 Windows ME ME stands for Millennium Edition.

 

Share:

What are the types of Eavesdropping attacks?

What are the types of Eavesdropping attacks?

  • Passive & Active
  • Data driven & software written
  • Right & Wrong
  • malicous & outbound 

What are the types of Eavesdropping attacks?

EXPLANATION

Eavesdropping attacks occur through the interception of network traffic. By eavesdropping, an attacker can obtain passwords, credit card numbers and other confidential information that a user might be sending over the network. Eavesdropping can be passive or active:
  • Passive eavesdropping — A hacker detects the information by listening to the message transmission in the network.
  • Active eavesdropping — A hacker actively grabs the information by disguising himself as friendly unit and by sending queries to transmitters. This is called probing, scanning or tampering.
Detecting passive eavesdropping attacks is often more important than spotting active ones, since active attacks requires the attacker to gain knowledge of the friendly units by conducting passive eavesdropping before.
Data encryption is the best countermeasure for eavesdropping.

SOURCE

https://blog.netwrix.com/2018/05/15/top-10-most-common-types-of-cyber-attacks/#Eavesdropping%20attack
Share:

Popular Posts