IT Questions and Answers :)

Saturday, December 7, 2019

Which command can be used in PowerShell but not in CMD?

Which command can be used in PowerShell but not in CMD?

  • CD
  • LS
  • TREE
  • DIR
Which command can be used in PowerShell but not in CMD?

EXPLANATION

PowerShell is mostly used by system administrators to manage the network as well as the systems and applications that are part of that network. It can efficiently interpret both Batch command and PowerShell commands, whereas cmd can interpret only Batch commands

PowerShell is a cross-platform solution, which means that now you can run it, of course, on Windows, but also on several different Linux distributions, on MacOSX 10.12 and also on the ARM platform! 


Share:

Which of these applications is included in an Office 365 E3 License?

Which of these applications is included in an Office 365 E3 License?

  • OneNote
  • Access
  • Visio
  • Project

EXPLANATION

Office 365 E3

• Includes full desktop versions of Office apps
• Each user can install Office mobile apps on 5 PCs or Macs, 5 tablets, and 5 phones
• Five layers of security and monitoring help keep customer data safe
• Reduce IT costs, and move to the cloud on your terms
• Guaranteed 99.9% uptime, and 24/7 support from Microsoft

Office 365 E3 includes

 

 

Share:

A PC has physical connections to two seperate networks/ subnets. One subnet has internet access, the other is an isolated test network. When the test network is connected the working internet connection fails. What is the issue, how do you know?

A PC has physical connections to two seperate networks/ subnets. One subnet has internet access, the other is an isolated test network. When the test network is connected the working internet connection fails. What is the issue, how do you know?

  • There is a broadcast storm on the isolated network, rapid activity lights blinking on connection.
  • A PC can't be a member of multiple subnets at once, the internet works when test network is offline
  • A route for the isolated network has a metric < or = to internet connection, use route print command
  • The PC has an invalid default gateway on the isolated network and can't connect to another network. 
A PC has physical connections to two seperate networks/ subnets. One subnet has internet access, the other is an isolated test network. When the test network is connected the working internet connection fails. What is the issue, how do you know?


EXPLANATION

2 PC's.
PC1 = 192.168.20.1/24
PC2 = 192.168.30.1/24

PC1 wants to ping PC2
The first thing it does is compare the IP address of PC2 with its own IP/subnetmask. It realises that PC2 is on another network.
PC1 checks its routing table to se if it has a route to PC2's subnet. Most likely it does not. But it should have a default route.
So what PC1 does is do an ARP for the default gateways IP and gets the MAC of the default address. (if it doesnt have a default gateway it then drops the ping)

PC1 then encapsulates the ping (icmp) in a ethernet frame with a destination address = MAC address of default gateway.

So when the ethernet frame arrives at the L2 switch it forwards the frame to the default gateway. NOT PC2.
Share:

In Microsoft Azure, What server size/series uses credits and slows down if the credits run out?

In Microsoft Azure, What server size/series uses credits and slows down if the credits run out?

  • F series
  • D series
  • B series
  • A series
In Microsoft Azure, What server size/series uses credits and slows down if the credits run out?

EXPLANATION

 B-series 

These are known as “burstable” VMs.  They are very useful but the way they work is a bit complicated.  B-series are used for non-CPU intensive workloads (e.g. domain controllers, file servers) and cost about 50% of an equivalently sized Ds-series VM.  The reason they’re cheaper is because Azure imposes a quota on how much of the total CPU cores can be used.  This quota is usually a fraction of the total available CPU. 
For instance, B2m’s quota is 60% of a single CPU, which is 30% of the 2 CPUs visible in the VM.  Every second that the VM is using less than its quota (less than 60% of a single CPU) it is “banking credits”.  These banked credits can be used to burst up to the total available CPUs (100% of 2 CPUs, in this example) when needed.  While bursting, the VM is consuming its banked credits.  Once credits run out, the VM’s CPU utilization is throttled down to its 60% quota.
Why use B-series VMs?  They are cheaper.  For approximately the same price that you would pay for a Ds-series VM, you can get a B-series with double the CPUs and double the RAM.  However, they should only be used for workloads that are either not CPU intensive or “bursty”, meaning they only occasionally need all the CPU but most of the time the CPU is idle. 
For instance, an Active Directory domain controller is not utilizing its CPU very heavily on a regular basis.  However, when Windows Updates run, the VM will use all its available CPU horsepower.  B-series are perfect for Domain Controllers since they bank credits while idle and then consume them when needed to update or do some other CPU intensive task.
  • Purpose: General, non-CPU intensive workloads (e.g. AD domain controllers, file servers) 
  • CPU clock speed: varies 
  • vCPU-to-RAM ratio: varies from 1:1 to 1:4 for VMs larger than B2s 
  • Storage supported: Standard and Premium 
  • Approximate average list price per CPU: ranges from $13/month to $40/month 
Nerdio Tips:
  • Don’t use B-series VMs for CPU intensive workloads 
  • When a B-series VM is first provisioned, it doesn’t have any banked credits and is subject to its quota limit on the CPU, which means it’s slow.  Once the VM is running idle for some time, credits get banked and the VM performance improves when it needs to burst. 
  • Don’t shut down B-series VMs overnight when they are not in use.  This will not allow the VMs to bank credits for the following day of usage.
Share:

On ARM64 processors, what exception level does the kernel run in?

On ARM64 processors, what exception level does the kernel run in?

  • EL3
  • EL2
  • EL0
  • EL1

EXPLANATION


Privilege and Exception levels

Before we explain the details of the Armv8-A exception model, let's start by introducing the concept of privilege. Modern software expects to be split into different modules, each with a different level of access to system and processor resources. An example of this is the split between the operating system kernel, which has a high level of access to system resources, and user applications, which have a more limited ability to configure the system.

Armv8-A enables this split by implementing different levels of privilege. The current level of privilege can only change when the processor takes or returns from an exception. Therefore, these privilege levels are referred to as Exception levels in the Armv8-A architecture. Each Exception level is numbered, and the higher levels of privilege have higher numbers.
As shown in the following diagram, the Exception levels are referred to as EL<x>, with x as a number between 0 and 3. For example, the lowest level of privilege is referred to as EL0.

A common usage model has application code running at EL0, with an operating system running at EL1. EL2 is used by a hypervisor, with EL3 being reserved by low-level firmware and security code.
Share:

Popular Posts