Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
Describe six ways in which a network manager might improve WAN service. Please provide description of your answer.
C Programming: Modular Design and Function What is a function? State the advantages in using a function. What is the difference between system defined and user defined functions?
Write a GUI application that simulates a pair of dice. Each time the button is clicked, the application should roll the due, using random numbers to determine the value of each die.
Question 1: Design a 3 by 1 multiplexer. Question 2: For C++, is there a way to return the index of a vector in a loop?
Question 1: What part/role does a storage area network (SAN) or networked attached storage (NAS) play in a business continuity plan? Question 2: What are the differences between reciprocal agreement,
Develop two models that would be useful in the analysis phase for a customer technical support hotline at a cable company (Tivomania). Do the same for two models in the design phase.
Explain the client/server model. Give three examples of services on LInux systems that take advantage of this model.
SQL Views Describe the use of, and give the syntax for, a simple view.(b) Describe the use of, and give the syntax for, a complex view.(c) Describe the use of, and give the syntax for, a materialize
Question 1: What does WSUS stand for and what does it do? Question 2: What is the difference between MBSA and Microsoft Update?
Why should you use the different password policy options available (with exception to storing the password using reversible encryption)?
Question 1: What are other password policy options that could be enforce to improve security? Question 2: Is using the option to "store password using reversible encryption" a good security practice?
What are some of the most common symptoms of malware? What are examples of harmful spyware application? What risk or threat do you pose to the workstation Domain?
What other anti-malicious software and anti-malicious code application are includes with Avira under the Real-Time Shields application? What risk and threats do these help mitigate?
Question 1: What is the one thing that a virus, worm, spyware, and malicious code have in common? What are the differences among these four threats? Question 2: How often should you update your anti
Question 1: What is the lowest level permission allow you to delete files and/or folder. Question 2: If you do not remember the syntax when usingIcacls.exe what command do you type in to see the optio
Question 1: Why would you allow shared access to groups instead of to everyone? Question 2: List at least 3 different types of access control permissions you can enable for a file.
Question 1: What is the principle of least privilege? Question 2: What does DACL stands for and what does it mean?
Question 1: What is the goal of a Page Replacement Policy? Question 2: How does the Least Recently Used page replacement policy select a page to be replaced when a new page must be made resident?
Question 1: Describe the operating system's Fetch Policy. Question 2: How does the pre-paging fetch policy reduce the number of page faults experienced when a process is initially started?
Question 1: What is a process's resident set? Question 2: What is the tradeoff when setting a process's resident set size i.e. too small vs too large?
What are the two characteristics of simple paging that lead to, and the breakthrough idea that is virtual memory? Hint: Three parts in slides.
Question 1: What is a page fault? Question 2: What operating system response does a page fault interrupt from the Memory Management Unit (MMU)?
Question 1: What is another type of design besides top-down or bottom-up? Question 2: What is .mrs files? How to open and edit it?
Using an Oracle or SQL Server,select an existing user and audit all its activities. Show the code, demonstrate it works properly and describe what it is doing.
Question 1: List the six DML triggers that Oracle offers. Question 2: Discuss the activity of promoting artifacts to the next level.