Documente Academic
Documente Profesional
Documente Cultură
Using host header names to uniquely identify sites on a server is recommended for most situations.
A primary key must contain unique values. If the primary key consists of multiple
columns, the combination of values in these columns must be unique.
A primary key column cannot contain NULL values. It means that you have to
declare the primary key column with NOT NULL attribute. If you dont, MySQL will
force the primary key column as NOT NULL implicitly.
A table has only one primary key.
/var is a standard subdirectory of the root directory in Linux and other Unixlike operating systems that contains files to which the system writes data during the
course of its operation.
The root directory is the directory that contains all other directories and files on a
system and which is designated by a forward slash ( / ). Among the other directories
that are usually installed by default in the root directory
are /bin, /boot, /dev, /etc, /home, /initrd, /lib, /lost+found, /misc, /mnt, /opt, /proc, /root
, /sbin, /tmp and /usr.
/var is specific for each computer; that is, it is not shared over a network with other
computers, in contrast to many other high-level directories. Its contents are not
included in /usr because situations can occur in which it is desired to mount /usr as
read-only, such as when it is on a CDROM or on another computer. /usr, which is
generally the largest directory (at least on a newly installed system) and is used to
store application programs, should only contain static data.
Among the various subdirectories within /var are /var/cache (contains cached data
from application programs), /var/games (contains variable data relating to games in
/usr), /var/lib (contains dynamic data libraries and files), /var/lock (contains lock files
created by programs to indicate that they are using a particular file or
device),/var/log (contains log files), /var/run (contains PIDs and other system
information that is valid until the system is booted again) and /var/spool (contains
mail, news and printer queues).
/bin is by default in PATH, which is the list of directories that the system searches for
the corresponding program when a command is issued. This means that anyexecutable
file (i.e., runnable program) in /bin can be run just by entering the file name at the
command line and then pressing the ENTER key
1.Explain what is the role you're applying about and how you understand it?
2.Have you used any AWS services in the past? Did you hit any challenges along the way
setting up those services?
1. Virtualization is the single most effective way to reduce IT expenses while boosting
efficiency and agilitynot just for large enterprises, but for small and midsize
businesses too. VMware virtualization lets you: Run multiple operating systems and
applications on a single computer.
5.How does the hypervisor work?
.
7.What TCP/IP is?
computer that you may send messages to or get information from also has a
copy of TCP/IP.
TCP/IP is a two-layer program. The higher layer, Transmission Control
Protocol, manages the assembling of a message or file into smaller packets
that are transmitted over the Internet and received by a TCP layer that
reassembles the packets into the original message. The lower layer, Internet
Protocol, handles the address part of each packet so that it gets to the right
destination. Each gateway computer on the network checks this address to
see where to forward the message. Even though some packets from the same
message are routed differently than others, they'll be reassembled at the
destination.
8.What a subnet mask is used for? How it works? What it's made up of?
An IP address has two components, the network address and the host address. A subnet mask
separates the IP address into the network and host addresses (<network><host>). Subnetting
further divides the host part of an IP address into a subnet and host address
(<network><subnet><host>) if additional subnetwork is needed. It is called a subnet mask because it
is used to identify network address of an IP address by perfoming a bitwise AND operation on the
netmask.
A Subnet mask is a 32-bit number that masks an IP address, and divides the IP address into
network address and host address. Subnet Mask is made by setting network bits to all "1"s and
setting host bits to all "0"s. Within a given network, two host addresses are reserved for special
purpose, and cannot be assigned to hosts. The "0" address is assigned a network address and "255"
is assigned to a broadcast address, and they cannot be assigned to hosts.
Examples of commonly used netmasks for classed networks are 8-bits (Class A), 16-bits (Class B)
and 24-bits (Class C), and classless networks are as follows:
Class
CIDR
CIDR
CIDR
CIDR
A
CIDR
CIDR
CIDR
CIDR
CIDR
Address
/4
/5
/6
/7
/8
/9
/10
/11
/12
/13
# of Hosts
240,435,456
134,217,728
67,108,864
33,554,432
16,777,216
8,388,608
4,194,304
2,097,152
1,048,576
524,288
Netmask (Binary)
11110000 00000000 00000000 00000000
11111000 00000000 00000000 00000000
11111100 00000000 00000000 00000000
11111110 00000000 00000000 00000000
11111111 00000000 00000000 00000000
11111111 10000000 00000000 00000000
11111111 11000000 00000000 00000000
11111111 11100000 00000000 00000000
11111111 11110000 00000000 00000000
11111111 11111000 00000000 00000000
Netmask (Decimal)
240.0.0.0
248.0.0.0
252.0.0.0
254.0.0.0
255.0.0.0
255.128.0.0
255.192.0.0
255.224.0.0
255.240.0.0
255.248.0.0
CIDR
CIDR
B
CIDR
CIDR
CIDR
CIDR
CIDR
CIDR
CIDR
C
CIDR
CIDR
CIDR
CIDR
CIDR
CIDR
/14
/15
/16
/17
/18
/19
/20
/21
/22
/23
/24
/25
/26
/27
/28
/29
/30
262,144
131,072
65,534
32,768
16,384
8,192
4,096
2,048
1,024
512
256
128
64
32
16
8
4
255.252.0.0
255.254.0.0
255.255.0.0
255.255.128.0
255.255.192.0
255.255.224.0
255.255.240.0
255.255.248.0
255.255.252.0
255.255.254.0
255.255.255.0
255.255.255.128
255.255.255.192
255.255.255.224
255.255.255.240
255.255.255.248
255.255.255.252
Subnetting an IP network is to separate a big network into smaller multiple networks for
reorganization and security purposes. All nodes (hosts) in a subnetwork see all packets transmitted
by any node in a network. Performance of a network is adversely affected under heavy traffic load
due to collisions and retransmissions.
Applying a subnet mask to an IP address separates network address from host address. The
network bits are represented by the 1's in the mask, and the host bits are represented by 0's.
Performing a bitwise logical AND operation on the IP address with the subnet mask produces the
network address. For example, applying the Class C subnet mask to our IP address 216.3.128.12
produces the following network address:
IP:
1101 1000 . 0000 0011 . 1000 0000 . 0000 1100
Mask: 1111 1111 . 1111 1111 . 1111 1111 . 0000 0000
--------------------------------------------1101 1000 . 0000 0011 . 1000 0000 . 0000 0000
(216.003.128.012)
(255.255.255.000)
(216.003.128.000)
Subnetting Network
Here is another scenario where subnetting is needed. Pretend that a web host with a Class C
network needs to divide the network so that parts of the network can be leased to its customers.
Let's assume that a host has a network address of 216.3.128.0 (as shown in the example above).
Let's say that we're going to divide the network into 2 and dedicate the first half to itself, and the
other half to its customers.
216 .
216 .
The web host will have the subnet mask of 216.3.128.128 (/25). Now, we'll further divide the 2nd half
into eight block of 16 IP addresses.
216 .
3 . 128 . (1000 0000)
216 .
3 . 128 . (1001 0000)
216 .
3 . 128 . (1010 0000)
216 .
3 . 128 . (1011 0000)
216 .
3 . 128 . (1100 0000)
216 .
3 . 128 . (1101 0000)
216 .
3 . 128 . (1110 0000)
216 .
3 . 128 . (1111 0000)
----------------------------255 . 255 . 255 . (1111 0000)
Customer
Customer
Customer
Customer
Customer
Customer
Customer
Customer
1
2
3
4
5
6
7
8
---------
Gets
Gets
Gets
Gets
Gets
Gets
Gets
Gets
16
16
16
16
16
16
16
16
IPs
IPs
IPs
IPs
IPs
IPs
IPs
IPs
(14
(14
(14
(14
(14
(14
(14
(14
usable)
usable)
usable)
usable)
usable)
usable)
usable)
usable)
9.In class C space, how many host can you have in that space? Is there a special IP address
that cannot be used?
UDP
connection, one after the other, you know the first don't know what order they'll arrive in i.e. no
message will get there first. You don't have to
ordered
nothing distinguishing where one packet ends and guaranteed to be whole if they arrive. One packet
another begins. There may be multiple packets
80), e-mail (SMTP TCP port 25 Postfix MTA), File port 53), streaming media applications such as
Transfer Protocol (FTP port 21) and Secure Shell IPTV or movies, Voice over IP (VoIP), Trivial File
(OpenSSH port 22) etc.
A records
Address (A) records direct a hostname to a numerical IP address. For example, if you want
mycomputer.yourdomain.com to point to your home computer (which is, for example, 192.168.0.3),
you would enter a record that looks like:
mycomputer.yourdomain.com. A 192.168.0.3
Important: You must put a period after the hostname. Do not put periods after IP addresses.
CNAME records
CNAME allows a machine to be known by one or more hostnames. There must always be an A
record first, and this is known as the canonical or official name. For example:
yourdomain.com. A 192.168.0.1
Using CNAME, you can point other hostnames to the canonical (A record) address. For example:
ftp.yourdoman.com. CNAME yourdomain.com.
mail.yourdomain.com. CNAME yourdomain.com.
ssh.yourdomin.com. CNAME yourdomain.com.
Then, enter two new nameservers records. Be sure that the nameserver hostname is followed by a
period, as in this example:
yourdomain.com NS ns1.slamdot.com.
Be sure to put a period after the nameserver hostname in an NS record (ns1.slamdot.com. and not
ns1.slamdot.com ).
MX records
Free e-mail services such as everyone.net require that MX changes be made in order for their
software to work. This change allows mail destined for your domain to be directed to their
server. Please note that changing MX records will prevent your current POP3 accounts, forwarders,
autoresponders, and mailing lists from functioning.
First, delete the old MX record by clicking the Delete icon under "Actions." There should now be no
MX records listed.
Next, click Create DNS Record and enter a name for your MX record. Select MX for the type, and
type in the hostname in the value field, followed by a period, given to you by the e-mail provider.
Then select the priority level (usually 10) from the dropdown box. The priority level will also be given
to you by the e-mail provider. Click Create Record.
Note: Be sure to put a period at the end of the hostname.
To restore the original MX settings, enter yourdomain.com. and priority 0 after deleting the other MX
record.
PTR records
Pointer records (PTR) are used for reverse lookups. For example, to make 192.168.0.1 resolve to
www.yourdomain.com, the record would look like:
1.0.168.192.in-addr.arpa PTR www.yourdomain.com.
Note: The IP address is reversed in the first field. Please use a period after your hostname (second
field).
1. The LMHOSTS (LAN Manager Hosts) file is used to enable Domain Name Resolution
under Windows when other methods, such as WINS, fail. It is used in conjunction with
workgroups and domains.
14.What are different RAID levels you can use? And which one would you use for specific
situation? What abour RAID5?
15. Windows PC has an IP address 169.254.X.X. What does it typically mean and whit the
cause? How would you troubleshoot it? What would you look for on the DHCP server? Is
there any log you can look at?
16.Windows Blue Screen of Death, what are the troubleshooting steps there?
18.When you press F8, there is an option "Last known good configuration" can you explain
exactly what that is?
It's a Windows startup option that uses the most recent system settings that worked correctly. Every time
you turn your computer off and Windows shuts down successfully, important system settings are saved in
the registry. If a problem occurs, you can restart your computer using those settings. For example, if a new
driver for your video card is causing problems, or an incorrect registry setting is preventing Windows from
starting correctly, you can restart your computer using Last Known Good Configuration.
19.There is a customer who used to be able to connect to a Windows server on the internet
over remote desktop, they now report they are unable to do so.
20.Can you explain what DCOM is and why it may not sometimes work?
21. How would you start a windows service for remote machine over the network.