IT Questions and Answers :)

Thursday, July 8, 2021

Which connector supports high frequencies required for applications beyond 10 Gigabit Ethernet?

Which connector supports high frequencies required for applications beyond 10 Gigabit Ethernet?

  • RJ45
  • GG100
  • GG45
  • RJ11     

Which connector supports high frequencies required for applications beyond 10 Gigabit Ethernet?


EXPLANATION

The GG45 (where GG stands for GigaGate, and 45 is to denote the backward compatibility with the 8P8C modular connector – often colloquially called RJ45) is a connector for high-speed Category 7 cable (generally known as Cat 7) LAN cabling developed by Nexans.

The cabling system was standardized in 2001 as IEC 60603-7-7, and then selected as a worldwide Category 7 cabling standard within ISO-11801.

GG45 connectors provide backwards compatibility for standard 8P8C (8P8C) connectors in a Category 6 cable interface (mode 1), where eight conductors are used for Cat 6 (100/250 MHz) operation.

In addition, GG45 has four additional contacts (two in each extreme corner) that interface with new high-speed Cat 7 600 MHz and Cat 7a 1000 MHz networks. Two twisted pairs are connected to these additional contacts, while the other two twisted pairs remain connected to the original 8P8C connector's most distant pins: 1 and 2; and 7 and 8. A Category 6 or 6A plug uses the original contact positions, but a Category 7 or 7A plug instead uses the contacts located in the four corners and has a protrusion that activates a switch within the jack for the alternative contact positions. This reduces crosstalk within the connector that higher speed data is sensitive to. The key advantage is that the GG45 interface therefore has plenty of headroom, combined with the ability to migrate to higher speed service by upgrading to Category 7A patch cords that activate the switch in the jack.[1]


SOURCE

Share:

Monday, July 5, 2021

What is RFC 1918?

What is RFC 1918?

  • A standar for HTTP
  • An IRC channel for network admins
  • A standard for private IPv4 addresses
  • A random UDP port number               
What is RFC 1918?


EXPLANATION

Wikipedia entry: Addresses in the private space are not allocated to any specific organization and anyone may use these addresses without approval from a regional Internet registry. However, IP packets addressed from them cannot be transmitted through the public Internet, and so if such a private network needs to connect to the Internet, it must do so via a network address translator (NAT) gateway, or a proxy server.

IETF documentation for RFC 1918

IPv6 equivalent RFC 4193

Share:

Thursday, June 3, 2021

If you wanted to retrieve all the records from TableA and only those records from TableB that matched, which query would you use?

 If you wanted to retrieve all the records from TableA and only those records from TableB that matched, which query would you use?

  • SELECT TableA.*, TableB.* FROM TableA INNER JOIN TableB ON TableA.PK = TableB.FK
  • SELECT TableA.*, TableB.* FROM TableA RIGHT JOIN TableB ON TableA.PK = TableB.FK
  • SELECT TableA.*, TableB.* FROM TableA LEFT JOIN TableB ON TableA.PK = TableB.FK
  • SELECT * FROM TableA UNION ALL SELECT * FROM TableB         

If you wanted to retrieve all the records from TableA and only those records from TableB that matched, which query would you use?

EXPLANATION

In this question we are joining TableA to TableB

An INNER JOIN will give you the results where there is a match between TableA and TableB on the join criteria.

A LEFT JOIN will return every record from the table on the left (TableA in this case) and only those records from TableB where there is a match on the join criteria.

A RIGHT JOIN does the exact opposite of the LEFT JOIN. It will return every record from the table on the right (TableB in this case) and only those records from TableA where there is a match on the join criteria.

A UNION ALL statement takes the results of two or more queries and returns them as one dataset. The only caveat is that the columns being returned must match for all queries.

SOURCE

Share:

Which of the following is a non-volatile memory ?

Which of the following is a non-volatile memory ?

  • RAM
  • LSI
  • VLSI
  • ROM   
Which of the following is a non-volatile memory ?


EXPLANATION

ROM stands for Read-Only-Memory. This type of memory is static with regards to the storage in that the changes to the ROM are not allowed (in most cases). 


SOURCE

Share:

Monday, May 31, 2021

A DHCP assigned IP address has a lease duration of 6 days. After how many days does the client start to try to renew the address if it is not rebooted?

A DHCP assigned IP address has a lease duration of 6 days. After how many days does the client start to try to renew the address if it is not rebooted?

  • 4 days
  • 3 days
  • 5 days
  • 6 days        

A DHCP assigned IP address has a lease duration of 6 days. After how many days does the client start to try to renew the address if it is not rebooted?


EXPLANATION

After half the lease time is over, the client will start to try to renew and extend the current lease with the DHCP server he got the address from. If he is unsuccessful, he will try again when 87.5% of the lease time is up, trying to find any server that can renew and extend the lease. If no server is found, the client releases the address after the lease time is up and the administrator is in trouble...

More info here.       
Share:

Which of the following is the default port used for POP3 SSL Traffic?

 Which of the following is the default port used for POP3 SSL Traffic?

  • 995
  • 25
  • 587
  • 110
Which of the following is the default port used for POP3 SSL Traffic?


EXPLANATION

POP uses port 110, but SSL/TLS encrypted POP uses port 995.


SOURCE

Share:

What is it called when RAID appears to be hardware-based, but is actually software-based?

What is it called when RAID appears to be hardware-based, but is actually software-based?

  • FakeRAID
  • HS-RAID
  • FalseRAID
  • Triple Parity RAID          
What is it called when RAID appears to be hardware-based, but is actually software-based?


EXPLANATION

FakeRAID is the industry term for software RAID that appears to be hardware RAID. This type of RAID is common in desktops.

What is Fake RAID?

So-called Fake RAID is a name commonly applied to motherboard / BIOS RAID features that provide the bare minimum for RAID functionality as it is understood. Low-end RAID cards get lumped in to this category because they may not offer the same DRAM cache and power loss protection features found in their more expensive counterparts. Why do low end RAID cards exist? They are mostly used to boot multiple operating systems from one array of hard drives.

SOURCE

https://skrypuch.com/raid/


     
Share:

Popular Posts