IT Questions and Answers :)

Friday, January 17, 2020

In an Active Directory Domain, the group policy is applied in what order?

In an Active Directory Domain, the group policy is applied in what order?

  • Child OU, Parent OU, Domain – Does not affect Sites or local machine policies.
  • Child OU, OU, Domain, Site, Local Machine.
  • Local Machine policy, then Site, then Domain, then OU, and finally the Child OU
  • OU, Child OU, Domain, Site – Does not affect local machine policies. 
In an Active Directory Domain, the group policy is applied in what order?


EXPLANATION

Order in which policies are applied
You can link Group Policy Objects throughout the hierarchical structure of the Active Directory environment. When you have different policies at different levels, they are applied in the following order unless you explicitly configure them to block inheritance or behave differently:
Local Group Policy Objects are applied first.
Site-level Group Policy Objects are applied in priority order.
Domain-level Group Policy Objects are applied in priority order.
Organizational Unit-level Group Policy Objects are applied in priority order down the hierarchical structure of your organization, so that the last Group Policy Object used in the one that applies to the Organizational Unit the user or computer resides in.
As this set of rules suggests, a Group Policy Object linked to a site applies to all domains at the site. A Group Policy Object applied to a domain applies directly to all users and computers in the domain and by inheritance to all users and computers in organizational units and containers farther down the Active Directory tree.
A Group Policy Object applied to an organizational unit applies directly to all users and computers in the organizational unit and by inheritance to all users and computers in its child organizational units.
You can modify the specific users and computers the GPO is applied to by choosing a different point in the hierarchy, blocking the default inheritance, using security groups to create Access Control Lists, or defining WMI filters.

 

Share:

Where are you most likely to find a rubber duck used for troubleshooting?

Where are you most likely to find a rubber duck used for troubleshooting?

  • Community manager's desk
  • Datacenter infrastructure testing
  • Networking tool kit
  • Software developer's desk 
Where are you most likely to find a rubber duck used for troubleshooting?

EXPLANATION

A rubber duck in use by a developer to aid code review. In software engineering, rubber duck debugging is a method of debugging code. The name is a reference to a story in the book The Pragmatic Programmer in which a programmer would carry around a rubber duck and debug their code by forcing themselves to explain it, ... It referenced rubber ducking as a powerful method for solving



Share:

What is the difference between a bit and a byte?

What is the difference between a bit and a byte?

  • They are the same.
  • A byte is 256 bits.
  • A byte is eight bits.
  • One measures bandwidth, the other throughput. 


EXPLANATION

Actually no, there's a big difference between a bit and a byte. A byte is much bigger — eight times bigger, to be exact, with eight bits in every byte. By extension, there are eight megabits in every megabyte, and one gigabyte is eight times bigger than one gigabit.

Share:

Thursday, January 16, 2020

Which of the following characters are the MOST efficient to use for a comment line when writing DOS batch files?

Which of the following characters are the MOST efficient to use for a comment line when writing DOS batch files?

  • **
  • ::
  • REM
  • ##


EXPLANATION

 :: is essentially a blank label that can never be jumped to, whereas REM is an actual command that just does nothing. In neither case (at least on Windows 7) does the presence of redirection operators cause a problem.
However, :: is known to misbehave in blocks under certain circumstances, being parsed not as a label but as some sort of drive letter. I'm a little fuzzy on where exactly but that alone is enough to make me use REM exclusively. It's the documented and supported way to embed comments in batch files whereas :: is merely an artifact of a particular implementation.

Here is an example where :: produces a problem in a FOR loop.
This example will not work in a file called test.bat on your desktop:
@echo off
for /F "delims=" %%A in ('type C:\Users\%username%\Desktop\test.bat') do (
    ::echo hello>C:\Users\%username%\Desktop\text.txt
)
pause
While this example will work as a comment correctly:
@echo off
for /F "delims=" %%A in ('type C:\Users\%username%\Desktop\test.bat') do (
    REM echo hello>C:\Users\%username%\Desktop\text.txt
)
pause
The problem appears to be when trying to redirect output into a file. My best guess is that it is interpreting :: as an escaped label called :echo.
Share:

What does "IT" stand for?

What does "IT" stand for?

  • Internet Technology
  • Information Technology
  • Information Transport
  • Information Techno 

EXPLANATION

Information technology is the use of computers to store, retrieve, transmit, and manipulate data or information. IT is typically used within the context of business operations as opposed to personal or entertainment technologies. IT is considered to be a subset of information and communications technology.


Share:

Popular Posts