News:

Choose a design and let our professionals help you build a successful website   - ITAcumens

Main Menu
Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - manimarank

#1
Chat Box / Re: Quiz : Backup & recovery
Nov 20, 2008, 07:29 PM
iSeries word scramble: Backup & recovery

How well do you know common iSeries backup & recovery terms? Test your iSeries smarts with our iSeries word scramble. See if you can unscramble these 20 iSeries-related words.

1. PKUABC
2. TESROER
3. ECRMAIL RGSEAOT
4. RMSB
5. RDTSAIES
6. OG SEAV
7. EBCJTSO
8. DSKI OCETROITPN
9. OEYRMM
10. TRAGOES OOPL
11. ETPA
12. NPIWGOER NDWO
13. FUROCNAIGIOTN
14. ARFEULI
15. GEDDMAA BEOSTJC
16. LSERPFIO
17. RBALRIY CTSEJOB
18. SCESCA SPHTA
19. ILDFEA IKDSS
20. EJNDLUAOR REIVCESRE

#2
Chat Box / Re: Quiz : Backup & recovery
Nov 20, 2008, 07:27 PM
Quiz: iSeries backup and recovery commands

When it comes to iSeries backup and recovery, are you in command of your commands? Do you know the difference between the "GO SAVE" and the "SAV command?"

By taking this quiz, you'll not only sharpen your backup and recovery skills, you'll be up-to-date on important backup tricks if you read the associated tips.

Here's a hint. These are the commands you can choose from. Good luck!

SAV
SAVOBJ
SAVSYS
SAVCFG
SAVCHGOBJ
SAVSECDTA
SAVSAVFDTA
SAVDLO
SAVLIB
GO SAVE

   1. Use the _________ command to save the following security data: User profiles, private authorities, authorization lists and authority holders.
      Your answer:

      See answer
   2.

      The _________ command saves a copy of each changed object or group of objects located in the same library.
      Your answer:

      See answer
   3.

      The _________ command saves a copy of the licensed internal code and the QSYS library in a format compatible with the installation of the iSeries.
      Your answer:

      See answer

   4.

      Using the _________ command is a simple way to make sure that you have a good backup of your entire server.
      Your answer:

      See answer

   5.

      The _________ command saves the contents of a save file to tape, optical, or diskette media. This command saves the save data in the save file to the device in a way that allows the user to restore objects directly from the device.
      Your answer:

      See answer
   6.

      The _________ command saves a copy of a single object or a group of objects located in the same library.
      Your answer:

      See answer
   7. The _________ command saves copies of the following: Documents, folders and distribution objects (mail).
      Your answer:

      See answer
   8.

      The _________ command saves all configuration and system resource management (SRM) objects without requiring a system in a restricted state.
      Your answer:

      See answer
   9.

      The _________ command saves a copy of one or more objects that can be used in the integrated file system.
      Your answer:

      See answer

  10. The _________ command saves the entire library; this includes the library description, the object descriptions, and the contents of the objects in the library.
      Your answer:

      See answer
#3
Chat Box / Re: Quiz : Backup & recovery
Nov 20, 2008, 07:25 PM
Backup school: Quiz

Question #1

ERD stands for:

a. End Recovery Data
b. Emergency Read Defragmentation
c. Emergency Recovery Disk
d. Emergency Restore Data

Click to see if you are correct!

Question #2

Users' data is best kept on the:

a. Partition closest to the tape drive
b. Second partition or drive
c. The first partition
d. None of the above

Click to see if you are correct!

Question #3

Two choices for disk imaging discussed in Lesson 5 are:

a.Centralized and decentralized
b. Localized and centralized
c. Decentralized and degragmented
d. Localized and defragmented

Click to see if you are correct!

Question #4

Imaging is used to:
a. Perform a typical backup
b. Archive old data for compliance purposes
c. Restore data in the event of a disaster
d. All of the above

Click to see if you are correct!

Question #5

Dorian says these die more than anything else in any organization worldwide:

a. Software
b. Employee stock options
c. Hard drives
d. Routers

Click to see if you are correct!

Question #6

ATA and newer SATA drives are not built to last as long as:

a. RAID arrays
b. SCSI drives
c. 10 GB drives
d. None of the above

Click to see if you are correct!

Question #7

Although hardware RAID controllers are much faster than software RAID controllers, Dorian says they are still much more:

a. Reliable
b. Bulky
c. Expensive
d. Secure

Click to see if you are correct!

Question #8

What is JBOD?

a. Just a Bunch of Disks
b. Jobs Bundled on Disks
c. Justified Batches on Delivery
d. None of the above

Click to see if you are correct!
#4
Chat Box / Quiz : Backup & recovery
Nov 20, 2008, 07:20 PM
Quiz : Backup & recovery

Question #31

This is a method of offloading backup procedures from a server so that the time ordinarily devoted to backup functions can be used to carry out other server tasks.

a. serverless backup
b. LAN-free backup
c. mirrored backup
d. timed backup
e. hard backup

Click to see if you are correct.

Question #32

This is a system for archiving data such as business records and reports to one or more optical disks in a compressed but easily retrievable format.

a. EDM (Electronic Document Management)
b. COLD (Computer Output to Laser Disk)
c. imaging system
d. compression
e. microfiche

Click to see if you are correct.

Question #33

This is a magnetic tape and drive system used for computer data storage and archiving. It can hold 40 gigabytes (GB) of data when compression is used, and can transfer data at speeds of up to 3 megabytes per second (Mbps) without compression and 6 Mbps with compression.

a. Mammoth
b. advanced intelligent tape (AIT)
c. linear tape-open (LTO)
d. digital linear tape (DLT)
e. REO speedwagon (REO)

Click to see if you are correct.

Question #34

This is a way of recording information onto magnetic tape. It was used to record TV programs in the 1960s, and has been used in high-end tape-backup products. It's also the same technology used in digital audio tapes.

a. quadruplex machine
b. linear
c. optical
d. helical scan
e. Vera (Vision Electronic Recording Apparatus)

Click to see if you are correct.

Question #35

This data replication technique ensures data integrity because updates to directories and bitmaps are constantly written to a serial log on disk before the original disk log is updated. In the event of a system failure, the data on the disk can be restored to its pre-crash configuration.

a. warehousing
b. scoreboarding
c. journaling
d. mining
e. cloning

Click to see if you are correct.

Question #36

SearchStorage.com expert W. Curtis Preston identifies six main steps to identifying any good disaster recovery plan. Which of the following is not one of them?

a. define unacceptable loss
b. watch your server speed
c. organize everything
d. document what you have
e. test test test

Click to see if you are correct.

Question #37

Backup and recovery expert W. Curtis Preston says there are five golden rules for backup. Which of the following is not one of these rules?

a. Back it up or give it up.
b. If it has not been backed up, it cannot be recovered.
c. If it has not been backed up off-site, it will not survive a fire.
d. If it has not been tested with a recovery, it is not a backup.
e. Tape rules -- it's the only way to go for backup.

Click to see if you are correct.

Question #38

Disk mirroring provides data protection in the case of disk failure because data is constantly updated to both disks, where each relies upon a common controller. However, there is an inherent problem in disk mirroring. What is it?

a. Drive reliability is eliminating the need for mirroring
b. Access to data is threatened if the controller fails
c. Data can't be mirrored remotely
d. Mirroring can't handle planned outages
e. Data sets can't be kept in synch

Click to see if you are correct.

Question #39

This is one method of ensuring data availability in which every write written to the primary side is written "in-order" to the remote side before the application sees an "I/O complete" message.

a. timed backup
b. local backup
c. synchronous replication
d. asynchronous replication
e. duplication

Click to see if you are correct.

Question #40

Which of the following is a disaster recovery don't?

a. Always back up data catalogs and directories
b. Run similarly designed backup and storage environments
c. Synchronize desktop and laptop data to the server
d. Place backup facilities near each other
e. Have monitoring, job execution and security features prepared
#5
Chat Box / Re: QUIZ:"Storage"
Nov 20, 2008, 07:08 PM
Top 25 data storage terms quiz ANSWERS

ANSWER FOR 25

1) An archive is a collection of computer files that have been packaged together for backup, to transport to some other location, for saving away from the computer so that more hard disk storage can be made available, or for some other purpose. An archive can include a simple list of files or files organized under a directory or catalog structure (depending on how a particular program supports archiving).

On personal computers with the Windows operating system, WinZip is a popular program that lets you create an archive (a single file that holds a number of files that you plan to save to another medium or send someone electronically) or extract its files. WinZip also compresses the files that are archived, but compression is not required to create an archive. A WinZip archive has the file name suffix ".zip".

In Unix-based operating systems, the tar (tape archive) utility can be used to create an archive or extract files from one. On mainframe operating systems such as IBM's MVS and OS/390, procedures for archiving or backing up files are often automated as a daily operation.

2) On Web sites as well as in libraries, an archive is a collection of individual publications that are often cataloged or listed and made accessible in some way. Magazines, journals, and newspapers with Web sites sometimes refer to their back issues as an archive.

3) Web and File Transfer Protocol sites that provide software programs that can be downloaded sometimes refer to the list of downloadable files as an archive or as archives.
#6
Chat Box / Re: QUIZ:"Storage"
Nov 20, 2008, 07:07 PM
Top 25 data storage terms quiz ANSWERS

ANSWER FOR 24

A disaster recovery plan (DRP) - sometimes referred to as a business continuity plan (BCP) or business process contingency plan (BPCP) - describes how an organization is to deal with potential disasters. Just as a disaster is an event that makes the continuation of normal functions impossible, a disaster recovery plan consists of the precautions taken so that the effects of a disaster will be minimized and the organization will be able to either maintain or quickly resume mission-critical functions. Typically, disaster recovery planning involves an analysis of business processes and continuity needs; it may also include a significant focus on disaster prevention.

Ask your questions about disaster recovery at ITKnowledgeExchange.com

Disaster recovery is becoming an increasingly important aspect of enterprise computing. As devices, systems, and networks become ever more complex, there are simply more things that can go wrong. As a consequence, recovery plans have also become more complex. According to Jon William Toigo (the author of Disaster Recovery Planning). For example, fifteen or twenty years ago if there was a threat to systems from a fire, a disaster recovery plan might consist of powering down the mainframe and other computers before the sprinkler system came on, disassembling components, and subsequently drying circuit boards in the parking lot with a hair dryer. Current enterprise systems tend to be too large and complicated for such simple and hands-on approaches, however, and interruption of service or loss of data can have serious financial impact, whether directly or through loss of customer confidence.

Appropriate plans vary from one enterprise to another, depending on variables such as the type of business, the processes involved, and the level of security needed. Disaster recovery planning may be developed within an organization or purchased as a software application or a service. It is not unusual for an enterprise to spend 25% of its information technology budget on disaster recovery.

Nevertheless, the consensus within the DR industry is that most enterprises are still ill-prepared for a disaster. According to the Disaster Recovery site, "Despite the number of very public disasters , still only about 50 percent of companies report having a disaster recovery plan. Of those that do, nearly half have never tested their plan, which is tantamount to not having one at all."
#7
Chat Box / Re: QUIZ:"Storage"
Nov 20, 2008, 07:06 PM
Top 25 data storage terms quiz ANSWERS

ANSWER FOR 23

Disk arrays

A storage array provides an independent, standalone platform where disk arrays can be gathered into extremely large groups -- sometimes hundreds of disks. This chapter of our Disk Storage All-In-One Guide looks at the wide range of disk array types, along with product and buyer's advice.
#8
Chat Box / Re: QUIZ:"Storage"
Nov 20, 2008, 07:05 PM
Top 25 data storage terms quiz ANSWERS

ANSWER FOR 22

Storage provisioning is the process of assigning storage, usually in the form of server disk drive space, in order to optimize the performance of a storage area network (SAN). Traditionally, this has been done by the SAN administrator, and it can be a tedious process.

Storage provisioning is done in steps, which must be followed in a specific order. The storage must be configured for optimum SAN performance. Logical unit numbers (LUNs) must be assigned within the network. The administrator must be certain that the data storage and recovery routes will be available to all users when needed. Alternate routes must be put in place that can keep the SAN functional in the event of partial failure. The administrator must make sure that the SAN can accommodate expected future expansion. After everything has been connected and all the programs have been installed, the entire SAN must be tested before sensitive and valuable data is committed to it.

In recent years, automated storage provisioning, also called auto-provisioning, programs have become available. These programs can reduce the time required for the storage provisioning process, and can free the administrator from the often distasteful task of performing this chore manually.
#9
Chat Box / Re: QUIZ:"Storage"
Nov 20, 2008, 07:04 PM
Top 25 data storage terms quiz ANSWERS

ANSWER FOR 21

A green data center is a repository for the storage, management, and dissemination of data in which the mechanical, lighting, electrical and computer systems are designed for maximum energy efficiency and minimum environmental impact. The construction and operation of a green data center includes advanced technologies and strategies. Here are some examples:

    * Minimizing the footprints of the buildings
    * The use of low-emission building materials, carpets and paints
    * Sustainable landscaping
    * Waste recycling
    * Installation of catalytic converters on backup generators
    * The use of alternative energy technologies such as photovoltaics, heat pumps, and evaporative cooling
    * The use of hybrid or electric company vehicles

Building and certifying a green data center or other facility can be expensive up front, but long-term cost savings can be realized on operations and maintenance. Another advantage is the fact that green facilities offer employees a healthy, comfortable work environment. In addition, green facilities enhance relations with local communities.

There is growing pressure from environmentalists and, increasingly, the general public for governments to offer green incentives: monetary support for the creation and maintenance of ecologically responsible technologies.
#10
Chat Box / Re: QUIZ:"Storage"
Nov 20, 2008, 03:24 PM
Top 25 data storage terms quiz ANSWERS

ANSWER FOR 20

There are endless regulatory requirements for information retention, and it seems like there are more unknowns in this aspect of storage than there are in the entire field of medicine. Based on what I'm hearing, this has confused, frustrated or otherwise caught many storage administrators off guard. There is so much ambiguity, people don't know where to start, what technologies to implement and whether they're even in compliance.

Related information

HP revamps RISS, unveils new archiving products

Using CAS for e-mail archiving

Records retention program
   
If you've fallen into this legal black hole, you're not alone. Even the lawyers and regulators who have written these "rules" acknowledge confusion associated with what electronic information to keep and what to destroy. There are so many variables involved and the rules are often open to interpretation. One thing is for sure though -- if you're creating or trying to manage an information retention strategy, there are some definite "gotchas" that you need to be aware of to keep yourself out of the boardroom hot seat and your managers out of the regulators' crosshairs. Keeping in mind that this isn't legal advice -- rather, real-world observations and experiences -- here are my unlucky 13:

   1. Don't forget that e-mail and instant messaging are business records -- a common oversight, especially in smaller organizations that still have to comply with the same regulations as the big dogs.
   2. Don't overlook other information that may be considered business records as well such as policies, procedures and audit reports.
   3. Don't believe the myth that you if you just destroy everything after it's no longer needed, you'll be fine. The organization may very well need it in order to defend itself in future audits and litigation.
   4. Don't assume that the retention requirement for all business-related information is the commonly-quoted "7 years." There are a lot of variables depending on the industry, type of organization and type of information. Based on my informal research, most lawyers that understand information retention agree that business records need to be kept indefinitely.
   5. Don't ever assume that you or the IT department has the capacity (manpower, knowledge, budget, etc.) to solely manage such a critical function. Information retention is a business issue and needs to be treated as such. That's why getting legal -- and ideally an overall IT governance committee -- involved is a must.
   6. Don't assume that limiting share space, size of user mailboxes, etc. will enforce retention or avoid any problems that may crop up related to it. Users will almost always adapt and find ways around your controls.
   7. Don't ever assume or expect that users can be trusted to do the right thing -- especially when it comes to complying with and helping enforce your organization's information retention policy.
   8. Don't make the mistake of leaving current retention procedures in place (such as suspending tape or disk backup rotations) in the event of a pending investigation, audit or other litigation. This can lead to unwanted charges of destruction of evidence.
   9. Don't assume that just because your retention policy says that everything is destroyed after a certain period of time that it actually is. Employees, auditors and others may have their own archives that can come back to help or haunt you in the future.
  10. Don't assume that just because you have access to archived information that'll you're going to be able to restore it within a reasonable amount of time. You need a solid set of procedures, so that you can meet legal demands as quickly and efficiently as possible while juggling all your other storage administration duties.
  11. Don't take a "delete everything" stance -- it's too risky and it's hard to prove you're not trying to cover something up. On the other hand, don't necessarily take a "save everything" stance. Not all information is equal. Saving everything can certainly help ensure that you've covered all your bases, but it can open up your organization to discovery risks, and perhaps worst of all, massive expenditures storing and administering everything long term. Find a middle ground when possible.
  12. Don't go to your lawyer, ask for a retention policy and accept that he or she will know what to draw up for you. I've seen way too many cases in which lawyers who are not IT and compliance-savvy use a generic template that has absolutely no bearing on what the organization actually needs. This stresses the need to find legal counsel who knows this part of the law for your specific industry and business type.
  13. And finally, Don't overlook the five tenets of information retention:
          * It's not just laws and regulations you've got to worry about -- it's also dealing with lawsuits and discovery requests
          * You really do need an information retention policy
          * You need to create and be able to demonstrate that you've got secure storage environment for your electronic business assets
          * Information needs to be searchable and retrievable in a timely manner
          * Time equals money: discovery costs (especially those related to e-mail or other business assets archived on backup tapes) can be huge and information often takes a long time to retrieve and sort through. This is especially true if you don't have the proper retention and archiving tools in place.

The lawmakers may have had good intentions when developing information retention requirements, but I'm convinced they didn't think about the long-term complexities involved and costs associated with what it really takes to do this. The reality is that the laws and regulations are here and we've got to learn to manage them. If you keep in mind what I've outlined above, survey your organization's legal landscape to determine what's really required and team up with the right people to manage information retention, you can sleep at night knowing that you're at least going to save some skin off your back.
#11
Chat Box / Re: QUIZ:"Storage"
Nov 20, 2008, 03:10 PM
Top 25 data storage terms quiz ANSWERS

SEARCH THE ANSWER FOR 19



#12
Chat Box / Re: QUIZ:"Storage"
Nov 20, 2008, 03:02 PM
Top 25 data storage terms quiz ANSWERS

SEARCH THE ANSWER FOR 18

#13
Chat Box / Re: QUIZ:"Storage"
Nov 20, 2008, 03:00 PM
Top 25 data storage terms quiz ANSWERS

ANSWER FOR 17

Storage encryption is the use of encryption/decryption of backed-up and archived data, both in transit and on storage media. Storage encryption is a feature of storage security that is gaining favor among enterprises that use storage area networks (SANs).

The main advantage of storage encryption in a SAN is the fact that it hardens the core of the network at relatively low cost. Multiple ciphers can be used for individual files, folders, or data volumes. In addition, two encryption arrangements can be used, one for data in transit and the other for stored and archived data. The ciphers, and the corresponding decryption keys, should be changed frequently.

Two criteria are said to help determine the potential effectiveness of any storage security plan. First, the cost of implementing the plan should be a small fraction of the value of the protected data. Second, it should cost a potential hacker more, in terms of money and/or time, to compromise the system than the protected data is worth. In this respect, storage encryption is often seen as an ideal solution. However, it is not completely foolproof, and is best used with other security measures such as hardware zoning. Because it works proactively, a relatively simple storage encryption arrangement can pay for itself in a short time. Storage encryption is an important element in what is referred to as deperimeterization.
#14
Chat Box / Re: QUIZ:"Storage"
Nov 20, 2008, 02:59 PM
Top 25 data storage terms quiz ANSWERS

ANSWER FOR 16

This can often be confusing once you read vendors' marketing materials. Simply stated, unified storage [or multiprotocol storage] refers to a single storage system that can support both file access and block access. That means I can use it for file systems and storing file data; or I can use an application that does block-based I/O right to that storage system. That [unified or multiprotocol] storage system is really operating in two modes: block and file.
#15
Chat Box / Re: QUIZ:"Storage"
Nov 20, 2008, 02:58 PM
Top 25 data storage terms quiz ANSWERS

SEARCH THE ANSWER FOR 15

#16
Chat Box / Re: QUIZ:"Storage"
Nov 20, 2008, 02:55 PM
Top 25 data storage terms quiz ANSWERS

ANSWER FOR 14

There's a lot of confusion around file virtualization, and virtualization in general, because the term virtualization can mean so many different things. But, when we talk about file virtualization, the focus is on file-level activities rather than block- (storage) level activities, like what you'd have in a Fibre Channel, iSCSI or direct-attached storage. But, we can break it down even further into three main areas: abstraction, emulation and aggregation. Abstraction refers to things like data movement, migration or copying. Emulation lets other devices seamlessly integrate with other applications or platforms. Aggregation lets one device sit in front of and combine multiple data streams or features.

The confusion comes in the notion of a global or clustered namespace that is actually a virtualized namespace -- think of it as a virtualized directory. As an example, consider DNS within a Windows file sharing or CIFS environment. Within a UNIX environment, there's an NIS implementation. This is the ability to see, in a single namespace, all the different file systems that are a part of that large "address space." As another example, the Internet may use a ".com" as a global designation for a URL. Don't confuse this with a global file system.

Ultimately, file virtualization is the ability to virtualize a file-type environment. This can be done by replication, migration, data movement or any number of other file-centric features. The general features are the same as you'd see in a block environment, such as transparent data movement and device emulation for interoperability; the difference in file virtualization is that you're dealing with files rather than blocks.
#17
Chat Box / Re: QUIZ:"Storage"
Nov 20, 2008, 02:51 PM
Top 25 data storage terms quiz ANSWERS

ANSWER FOR 13

Backup is the activity of copying files or databases so that they will be preserved in case of equipment failure or other catastrophe. Backup is usually a routine part of the operation of large businesses with mainframes as well as the administrators of smaller business computers. For personal computer users, backup is also necessary but often neglected. The retrieval of files you backed up is called restoring them.

Personal computer users can consider both local backup and Internet backup.
#18
Chat Box / Re: QUIZ:"Storage"
Nov 20, 2008, 02:49 PM
Top 25 data storage terms quiz ANSWERS

ANSWER FOR 12

Continuous data protection (CDP), also called continuous backup, is a storage system in which all the data in an enterprise is backed up whenever any change is made. In effect, CDP creates an electronic journal of complete storage snapshots, one storage snapshot for every instant in time that data modification occurs.

A major advantage of CDP is the fact that it preserves a record of every transaction that takes place in the enterprise. In addition, if the system becomes infected with a virus or Trojan, or if a file becomes mutilated or corrupted and the problem is not discovered until some time later, it is always possible to recover the most recent clean copy of the affected file. A CDP system with disk storage offers data recovery in a matter of seconds -- much less time than is the case with tape backups or archives. Installation of CDP hardware and programming is straightforward and simple and does not put existing data at risk.

The market for CDP products is expected to grow as businesses discover the advantages of maintaining a continuous journal of backups or archives generated over time. This is especially true for enterprises in which data changes often, the amount of stored data is large, or serious injury to the business could result from lost data, damaged files, or extended downtime.
#19
Chat Box / Re: QUIZ:"Storage"
Nov 20, 2008, 02:44 PM
Top 25 data storage terms quiz ANSWERS

ANSWER FOR 11

Tiered storage is the assignment of different categories of data to different types of storage media in order to reduce total storage cost. Categories may be based on levels of protection needed, performance requirements, frequency of use, and other considerations. Since assigning data to particular media may be an ongoing and complex activity, some vendors provide software for automatically managing the process based on a company-defined policy.

As an example of tiered storage, tier 1 data (such as mission-critical, recently accessed, or top secret files) might be stored on expensive and high-quality media such as double-parity RAIDs (redundant arrays of independent disks). Tier 2 data (such as financial, seldom-used, or classified files) might be stored on less expensive media in conventional storage area networks (SANs). As the tier number increased, cheaper media could be used. Thus, tier 3 in a 3-tier system might contain event-driven, rarely used, or unclassified files on recordable compact discs (CD-Rs) or tapes.
#20
Chat Box / Re: QUIZ:"Storage"
Nov 20, 2008, 11:28 AM
Top 25 data storage terms quiz ANSWERS

ANSWER FOR 10

Virtualization is the pooling of physical storage from multiple network storage devices into what appears to be a single storage device that is managed from a central console. Storage virtualization is commonly used in a storage area network (SAN). The management of storage devices can be tedious and time-consuming. Storage virtualization helps the storage administrator perform the tasks of backup, archiving, and recovery more easily, and in less time, by disguising the actual complexity of the SAN.

Users can implement virtualization with software applications or by using hardware and software hybrid appliances. The technology can be placed on different levels of a storage area network.
#21
Chat Box / Re: QUIZ:"Storage"
Nov 20, 2008, 11:28 AM
Top 25 data storage terms quiz ANSWERS

ANSWER FOR 9

Data deduplication is one of the hottest topics in backup right now, which means it's awash with vendor spin and hype. This Special Report explores how data deduplication products are shaping up in the marketplace, who the key suppliers are and what storage managers should be aware of when evaluating these products.
#22
Chat Box / Re: QUIZ:"Storage"
Nov 20, 2008, 11:27 AM
Top 25 data storage terms quiz ANSWERS

ANSWER FOR 8

Serial-attached SCSI (SAS) is a method used in accessing computer peripheral devices that employs a serial (one bit at a time) means of digital data transfer over thin cables. The method is specified in the American National Standard Institute standard called Serial-attached SCSI (Small Computer System Interface), also known as ANSI/INCITS 376-2003. In the business enterprise, serial-attached SCSI is especially of interest for access to mass storage devices, particularly external hard drives.

Serial-attached SCSI offers advantages over older parallel technologies. The cables are thinner, and the connectors are less bulky. Serial data transfer allows the use of longer cables than parallel data transfer. Problems related to crosstalk are less likely in serial interfaces than in parallel interfaces, because there are fewer conductors in the cables. The hardware for serial interfaces is less costly than the hardware for equivalent parallel interfaces.

SAS offers data transfer rates in excess of 3 gigabits per second (Gbps) with potential rates of 10 Gbps or more. Serial-attached SCSI is said to offer an ideal solution for businesses with substantial storage, backup, and archiving demands.

Devices that employ SAS are compatible with Serial ATA (Advanced Technology Attachment) devices. In addition, SAS products are compatible with devices that employ earlier SCSI technologies. External disk drives, host adapters, and expanders were the first devices to employ SAS. The technology is expected to expand to printers, scanners, digital cameras, and other peripherals.
#23
Chat Box / Re: QUIZ:"Storage"
Nov 20, 2008, 11:25 AM
Top 25 data storage terms quiz ANSWERS

ANSWER FOR 7

A storage area network (SAN) is a high-speed special-purpose network (or subnetwork) that interconnects different kinds of data storage devices with associated data servers on behalf of a larger network of users. Typically, a storage area network is part of the overall network of computing resources for an enterprise. A storage area network is usually clustered in close proximity to other computing resources such as IBM z990 mainframes but may also extend to remote locations for backup and archival storage, using wide area network carrier technologies such as ATM or SONET.
#24
Chat Box / Re: QUIZ:"Storage"
Nov 20, 2008, 11:25 AM
Top 25 data storage terms quiz ANSWERS

ANSWER FOR 6

RAID, as you've most likely noticed, is changing in the enterprise. Fibre Channel (FC) disks still provide the high-reliability and performance that they are renowned for, but a greater selection of disk types and advances in storage hardware are impacting the way that IT departments deploy RAID. Rapid growth and larger drive capacities are also influencing RAID rebuild times and constraining performance in some environments. Storage administrators must understand the changes that are taking place, and position their organizations to make the most of RAID technology. This article examines the effect of new disk types on RAID deployments, outlines the changing implementation issues and problems that you can expect, and highlights the future trends of this essential storage practice.
#25
Chat Box / Re: QUIZ:"Storage"
Nov 20, 2008, 11:24 AM
Top 25 data storage terms quiz ANSWERS

ANSWER FOR 5

The logical unit described here is different than the logical unit of IBM's Systems Network Architecture (SNA).

A logical unit number (LUN) is a unique identifier used on a SCSI bus that enables it to differentiate between up to eight separate devices (each of which is a logical unit). Each LUN is a unique number that identifies a specific logical unit, which may be an end user, a file, or an application program.

A SCSI (Small System Computer Interface) is a parallel interface, that can have up to eight devices all attached through a single cable; the cable and the host (computer) adapter make up the SCSI bus. The bus allows the interchange of information between devices independently of the host. In the SCSI program, each device is assigned a unique number, which is either a number between 0 and 7 for an 8-bit (narrow) bus, or between 8 and 16 for a 16-bit (wide) bus. The devices that request input/output (I/O) operations are initiators and the devices that perform these operations are targets. Each target has the capacity to connect up to eight additional devices through its own controller; these devices are the logical units, each of which is assigned a unique number for identification to the SCSI controller for command processing.
#26
Chat Box / Re: QUIZ:"Storage"
Nov 20, 2008, 11:22 AM
Top 25 data storage terms quiz ANSWERS

ANSWER FOR 4

iSCSI is Internet SCSI (Small Computer System Interface), an Internet Protocol (IP)-based storage networking standard for linking data storage facilities, developed by the Internet Engineering Task Force (IETF). By carrying SCSI commands over IP networks, iSCSI is used to facilitate data transfers over intranets and to manage storage over long distances. The iSCSI protocol is among the key technologies expected to help bring about rapid development of the storage area network (SAN) market, by increasing the capabilities and performance of storage data transmission. Because of the ubiquity of IP networks, iSCSI can be used to transmit data over local area networks (LANs), wide area networks (WANs), or the Internet and can enable location-independent data storage and retrieval.
#27
Chat Box / Re: QUIZ:"Storage"
Nov 20, 2008, 11:22 AM
Top 25 data storage terms quiz ANSWERS

ANSWER FOR 3

Fibre Channel is a technology for transmitting data between computer devices at data rates of up to 4 Gbps (and 10 Gbps in the near future). Fibre Channel is especially suited for connecting computer servers to shared storage devices and for interconnecting storage controllers and drives. Since Fibre Channel is three times as fast, it has begun to replace the Small Computer System Interface (SCSI) as the transmission interface between servers and clustered storage devices. Fibre channel is more flexible; devices can be as far as ten kilometers (about six miles) apart if optical fiber is used as the physical medium. Optical fiber is not required for shorter distances, however, because Fibre Channel also works using coaxial cable and ordinary telephone twisted pair.

Fibre Channel offers point-to-point, switched, and loop interfaces. It is designed to interoperate with SCSI, the Internet Protocol (IP) and other protocols, but has been criticized for its lack of compatibility - primarily because (like in the early days of SCSI technology) manufacturers sometimes interpret specifications differently and vary their implementations.

Standards for Fibre Channel are specified by the Fibre Channel Physical and Signalling standard, and the ANSI X3.230-1994, which is also ISO 14165-1
#28
Chat Box / Re: QUIZ:"Storage"
Nov 20, 2008, 11:21 AM
Top 25 data storage terms quiz ANSWERS

ANSWER FOR 2

Serial ATA (Serial Advanced Technology Attachment or SATA) is a new standard for connecting hard drives into computer systems. As its name implies, SATA is based on serial signaling technology, unlike current IDE (Integrated Drive Electronics) hard drives that use parallel signaling.

SATA has several practical advantages over the parallel signaling (also called Parallel ATA or PATA) that has been used in hard drives since the 1980s. SATA cables are more flexible, thinner, and less massive than the ribbon cables required for conventional PATA hard drives. SATA cables can be considerably longer than PATA ribbon cables, allowing the designer more latitude in the physical layout of a system. Because there are fewer conductors (only 7 in SATA as compared with 40 in PATA), crosstalk and electromagnetic interference (EMI) are less likely to be troublesome. The signal voltage is much lower as well (250 mV for SATA as compared with 5 V for PATA).
#29
Chat Box / Re: QUIZ:"Storage"
Nov 20, 2008, 11:20 AM
Top 25 data storage terms quiz ANSWERS

ANSWER FOR 1

Network-attached storage (NAS) is hard disk storage that is set up with its own network address rather than being attached to the department computer that is serving applications to a network's workstation users. By removing storage access and its management from the department server, both application programming and files can be served faster because they are not competing for the same processor resources. The network-attached storage device is attached to a local area network (typically, an Ethernet network) and assigned an IP address. File requests are mapped by the main server to the NAS file server.
#30
Chat Box / Are you a Know-IT-All?
Nov 20, 2008, 11:17 AM
In 1968, what computer code did President Lyndon Johnson approve as a national standard?
#31
Chat Box / Re: quiz: "Messaging and E-Mail"
Nov 19, 2008, 08:21 PM
Exchange Geek-o-Meter ANSWERS

ANSWERS FOR 10

DEFINITION - What is VoIP?

VoIP (voice over IP) is an IP telephony term for a set of facilities used to manage the delivery of voice information over the Internet.VoIP involves sending voice information in digital form in discrete packets rather than by using the traditional circuit-committed protocols of the public switched telephone network (PSTN). A major advantage of VoIP and Internet telephony is that it avoids the tolls charged by ordinary telephone service.
#32
Chat Box / Re: quiz: "Messaging and E-Mail"
Nov 19, 2008, 08:21 PM
Exchange Geek-o-Meter ANSWERS

ANSWERS FOR 9

Spim is spam delivered through instant messaging (IM) instead of through e-mail messaging. Although less ubiquitous than its e-mail counterpart, spim is reaching more users all the time. According to a report from Ferris Research, 500 million IM spam were sent in 2003, twice the level of 2002. As it becomes more prevalent, spim could impact the business community similarly to the way that spam does now, by consuming corporate resources and creating security problems.

In some ways, IM is an especially useful channel for spammers. For one thing, the immediacy of IM makes users more likely to reflexively click links. Furthermore, because it bypasses anti-virus software and firewalls, IM is an easy means of passing on not only commercial messages, but also viruses and other malware. Meanwhile, government, corporations, and ISPs are united in the fight against spam, with proposed solutions such as e-mail postage and legislation such as the Can-Spam Act of 2003. As anti-spam measures for e-mail are more widely implemented and become more effective, frustrated spammers may increasingly turn to spim.

One way to protect yourself from spim is to block messages from anyone not your buddy list, or to allow messages only from those on a permission list. Here's how to do that in some of the popular IM programs:

    * In the AOL IM program window, select "preferences" on the bottom left hand side. In the Preferences window, elect the "Privacy" category from the list on the left-hand side, and then choose from the options available, such as "Allow only users on my Buddy list."
    * In the Yahoo IM window, under "Login," select "Privacy Settings," and then select "Ignore anyone who is not on my Friends list."
    * In the MSN Messenger window, under "Tools," select "Options," and then click the "Privacy" tab. Click the box by "Only people on my Allow List can see my status and send me messages."
#33
Chat Box / Re: quiz: "Messaging and E-Mail"
Nov 19, 2008, 08:21 PM
Exchange Geek-o-Meter ANSWERS

ANSWERS FOR 8

MAPI (Messaging Application Program Interface) is a Microsoft Windows program interface that enables you to send e-mail from within a Windows application and attach the document you are working on to the e-mail note. Applications that take advantage of MAPI include word processors, spreadsheets, and graphics applications. MAPI-compatible applications typically include a Send Mail or Send in the File pulldown menu of the application. Selecting one of these sends a request to a MAPI server.

MAPI consists of a standard set of C language functions that are stored in a program library known as a dynamic link library (DLL). Developers who are using Microsoft's Active Server Page (ASP) technology access the MAPI library by using Microsoft's Collaboration Data Objects (CDO). The CDO library comes with Microsoft's Internet Information Server (IIS). MAPI functions can be accessed by Visual Basic developers through a Basic-to-C translation layer.

Eudora, one of the most popular e-mail programs, includes a MAPI server. To activate the Eudora MAPI server, select Options from the Tools pulldown menu and then double-click on MAPI and specify whether MAPI should always be active or whether it should be active only when Eudora is running. Microsoft Exchange and possibly some other programs may require that you turn the MAPI server off when they are in use.
#34
Chat Box / Re: quiz: "Messaging and E-Mail"
Nov 19, 2008, 08:20 PM
Exchange Geek-o-Meter ANSWERS

ANSWERS FOR 7

An open relay (sometimes called an insecure relay or a third-party relay) is an SMTP e-mail server that allows third-party relay of e-mail messages. By processing mail that is neither for nor from a local user, an open relay makes it possible for an unscrupulous sender to route large volumes of spam. In effect, the owner of the server -- who is typically unaware of the problem -- donates network and computer resources to the sender's purpose. In addition to the financial costs incurred when a spammer hijacks a server, an organization may also suffer system crashes, equipment damage, and loss of business.

In the past, open relays were used intentionally, for example, to facilitate mail relay between the separate closed e-mail systems (such as UUCP or FidoNet) or to allow network administrators to debug mail connectivity issues and route mail around known problems. However, the Internet has expanded enormously since then, and the potential for abuse has expanded accordingly. Spammers have learned that by hijacking open relays, they can in effect "launder" their spam, delivering their unsolicited e-mail while spoofing their identity to make their messages appear to come from a legitimate source.

Spammers are able to locate accessible third-party mail relay servers by using automated tools that are readily available on the Internet. By relaying mail through several open relay mail servers at the same time, it is possible to flood the Internet with large amounts of junk mail in a very short period of time before being detected. Spammers who use third-party mail relays not only damage the reputation of those whose servers they have hijacked, clog networks with junk mail, and frequently crash servers -- they are guilty of breaking the law because technically, they are stealing services.

The Mail Abuse Prevention System (MAPS) is one of several organizations that seeks to control the problem of open relays, though educating the public about the danger, and through publishing a blacklist of organizations whose mail hosts allow third-party relays. The relay feature is a part of all SMTP-based servers, which means that most modern e-mail servers, if unprotected, are vulnerable. According to MAPS, because spammers use automated tools to search the Internet for vulnerable servers, an open relay will eventually be found and used. To avoid allowing spammers free access to their resources -- and to help stem the Internet's flow of spam -- MAPS urges administrators to turn off the relay option on their servers.
#35
Chat Box / Re: quiz: "Messaging and E-Mail"
Nov 19, 2008, 08:20 PM
Exchange Geek-o-Meter ANSWERS

ANSWERS FOR 6

Gmail (pronounced Gee-mail) is a free Web-based e-mail service currently being tested at Google that provides users with a gigabyte of storage for messages and provides the ability to search for specific messages. The Gmail program also automatically organizes successively related messages into a conversational thread.

According to Google co-founder and president Larry Page, the company was inspired to create Gmail because of a user's letter complaining about problems with existing Web e-mail services, such as the constant need to delete messages to stay within storage limits, and the lack of any searching ability. The two largest Web e-mail providers, Yahoo and Microsoft, allow users four megabytes and two megabytes, respectively, for storing messages. Both services charge a fee for additional storage. Yahoo Mail provides a search capability; Microsoft's Hotmail service does not.

To make Gmail profitable, Google will sell advertising and deliver it to targeted users. The company's software will parse users' messages to determine advertising matches and will occasionally insert appropriate ads in e-mail messages. Some have raised concerns about privacy issues, and the intrusiveness of the ads. However, in a recent interview, Page insisted that there would be strict safeguards in place to protect user information, and that the ads would not be "annoying." Furthermore, although there will be some advertising within messages, the program will be free of more traditional advertising, such as banners or pop-up ads.
#36
Chat Box / Re: quiz: "Messaging and E-Mail"
Nov 19, 2008, 08:19 PM
Exchange Geek-o-Meter ANSWERS

ANSWERS FOR 5

Elk Cloner was the first computer virus known to have spread in the wild. In 1982, Richard Skrenta, then fifteen years old, wrote the virus for the Apple II operating system, which was stored on floppy diskettes. When a computer booted from a floppy disk infected with Elk Cloner, the virus would start, and would subsequently copy itself to any uninfected floppy disk that was accessed. Because computers of that time had dual floppy disk drives, and because diskettes were often passed around among friends, the virus was frequently copied. After contagion, every 50th time that a computer booted up, it would display the following text:

     Elk Cloner:  The program with a personality

        It will get on all your disks
          It will infiltrate your chips
            Yes it's Cloner!

        It will stick to you like glue
          It will modify ram too
            Send in the Cloner!

Elk Cloner was not intended to cause damage, but was created as a practical joke. According to WorldHistory.com, the adolescent Skrenta had a penchant for modifying programs so that they stopped working after some code-specified time period had elapsed, at that point displaying some joke text that Skrenta had written. Not surprisingly, the young programmer's friends grew leery of allowing him access to their diskettes. Elk Cloner's capacity to copy itself (the major criterion of a virus) made it possible for Skrenta to continue to annoy his friends without requiring physical access. The virus is reported to have spread widely among his fellow students (and also to his math teacher), thus ensuring Elk Cloner's place in history.
#37
Chat Box / Re: quiz: "Messaging and E-Mail"
Nov 19, 2008, 08:19 PM
Exchange Geek-o-Meter ANSWERS

ANSWERS FOR 4

Defragmentation is the process of locating the noncontiguous fragments of data into which a computer file may be divided as it is stored on a hard disk, and rearranging the fragments and restoring them into fewer fragments or into the whole file. Defragmentation reduces data access time and allows storage to be used more efficiently. Some operating systems automatically defragment storage periodically; others require that the user occasionally use a special utility for this purpose. Windows 98 comes with a built-in defragmenter as a "system tool" that the user can run. Windows NT did not come with a defragmenter because its file system, NTFS, was designed to minimize fragmentation; however, NT users often find one necessary and several vendors provide defragmenters. Windows 2000 comes with a "light" version of the Diskeeper defragmenter; some users (especially corporate users) use Diskeeper or some other full-function defragmentation program to manage storage efficiency and performance. Windows XP comes with a utility called "Disk Defragmenter."

"Defrag" is a short form of the verb to defragment and sometimes the name of the utility used for defragementing, which is also called a defragmenter.
#38
Chat Box / Re: quiz: "Messaging and E-Mail"
Nov 19, 2008, 08:18 PM
Exchange Geek-o-Meter ANSWERS

ANSWERS FOR 3

A back door is a means of access to a computer program that bypasses security mechanisms. A programmer may sometimes install a back door so that the program can be accessed for troubleshooting or other purposes. However, attackers often use back doors that they detect or install themselves, as part of an exploit. In some cases, a worm is designed to take advantage of a back door created by an earlier attack. For example, Nimda gained entrance through a back door left by Code Red.

Whether installed as an administrative tool or a means of attack, a back door is a security risk, because there are always crackers out there looking for any vulnerability to exploit. In her article "Who gets your trust?" security consultant Carole Fennelly uses an analogy to illustrate the situation: "Think of approaching a building with an elaborate security system that does bio scans, background checks, the works. Someone who doesn't have time to go through all that might just rig up a back exit so they can step out for a smoke -- and then hope no one finds out about it."
#39
Chat Box / Re: quiz: "Messaging and E-Mail"
Nov 19, 2008, 08:18 PM
Exchange Geek-o-Meter ANSWERS

ANSWERS FOR 2

Active Directory is Microsoft's trademarked directory service, an integral part of the Windows 2000 architecture. Like other directory services, such as Novell Directory Services (NDS), Active Directory is a centralized and standardized system that automates network management of user data, security, and distributed resources, and enables interoperation with other directories. Active Directory is designed especially for distributed networking environments.
#40
Chat Box / Re: quiz: "Messaging and E-Mail"
Nov 19, 2008, 08:17 PM
Exchange Geek-o-Meter ANSWERS

ANSWERS FOR 1

The Anna Kournikova VBS.SST computer virus, informally known as "Anna," is a viral worm that uses Visual Basic to infect Windows systems when a user unwittingly opens an e-mail note with an attachment that appears to be a graphic image of Russian tennis star Anna Kournikova. However, when the file is opened, a clandestine code extension enables the worm to copy itself to the Windows directory and then send the file as an attachment to all addresses listed in your Microsoft Outlook e-mail address book.

The virus arrives as e-mail with the following subject, message, and attachment:

Subject: Here you have, ;o)

Message body: Hi: Check This!

Attachment: AnnaKournikova.jpg.vbs

There are a number of variants of the virus that according to Symantec Corp. "have been encoded using a virus-creation kit." Extensions include VBS.Lee-o, VBS.OnTheFly, I-Worm.Lee.o and VBS.WG.Fly worm. If the date in your computer is Jan. 26, the "Anna" virus also causes your Internet browser to open to a Web site in the Netherlands, where the virus appears to have originated.

Although its geographic distribution and presence in the wild are both assessed as high, the Anna virus appears to pose only low-to-medium risk. Researchers say the virus is more of a nuisance than a threat, since it does not damage the systems it infects. SST also is easy to contain and to remove from infected computers.
#41
Chat Box / Re: quiz: "Messaging and E-Mail"
Nov 19, 2008, 03:13 PM
Email Security ANSWERS

ANSWER FOR 10

In computers, a virus is a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document. Viruses can be transmitted as attachments to an e-mail note or in a downloaded file, or be present on a diskette or CD. The immediate source of the e-mail note, downloaded file, or diskette you've received is usually unaware that it contains a virus. Some viruses wreak their effect as soon as their code is executed; other viruses lie dormant until circumstances cause their code to be executed by the computer. Some viruses are benign or playful in intent and effect ("Happy Birthday, Ludwig!") and some can be quite harmful, erasing data or causing your hard disk to require reformatting. A virus that replicates itself by resending itself as an e-mail attachment or as part of a network message is known as a worm.

Generally, there are three main classes of viruses:
#42
Chat Box / Re: quiz: "Messaging and E-Mail"
Nov 19, 2008, 03:13 PM
Email Security ANSWERS

ANSWER FOR 9

E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations. Spoofing can be used legitimately. Classic examples of senders who might prefer to disguise the source of the e-mail include a sender reporting mistreatment by a spouse to a welfare agency or a "whistle-blower" who fears retaliation. However, spoofing anyone other than yourself is illegal in some jurisdictions.

E-mail spoofing is possible because Simple Mail Transfer Protocol (SMTP), the main protocol used in sending e-mail, does not include an authentication mechanism. Although an SMTP service extension (specified in IETF RFC 2554) allows an SMTP client to negotiate a security level with a mail server, this precaution is not often taken. If the precaution is not taken, anyone with the requisite knowledge can connect to the server and use it to send messages. To send spoofed e-mail, senders insert commands in headers that will alter message information. It is possible to send a message that appears to be from anyone, anywhere, saying whatever the sender wants it to say. Thus, someone could send spoofed e-mail that appears to be from you with a message that you didn't write.

Although most spoofed e-mail falls into the "nuisance" category and requires little action other than deletion, the more malicious varieties can cause serious problems and security risks. For example, spoofed e-mail may purport to be from someone in a position of authority, asking for sensitive data, such as passwords, credit card numbers, or other personal information -- any of which can be used for a variety of criminal purposes. The Bank of America, eBay, and Wells Fargo are among the companies recently spoofed in mass spam mailings. One type of e-mail spoofing, self-sending spam, involves messages that appear to be both to and from the recipient.
#43
Chat Box / Re: quiz: "Messaging and E-Mail"
Nov 19, 2008, 03:13 PM
Email Security ANSWERS

ANSWER FOR 8

Transport Layer Security (TLS) is a protocol that ensures privacy between communicating applications and their users on the Internet. When a server and client communicate, TLS ensures that no third party may eavesdrop or tamper with any message. TLS is the successor to the Secure Sockets Layer (SSL).

TLS is composed of two layers: the TLS Record Protocol and the TLS Handshake Protocol. The TLS Record Protocol provides connection security with some encryption method such as the Data Encryption Standard (DES). The TLS Record Protocol can also be used without encryption. The TLS Handshake Protocol allows the server and client to authenticate each other and to negotiate an encryption algorithm and cryptographic keys before data is exchanged.

The TLS protocol is based on Netscape's SSL 3.0 protocol; however, TLS and SSL are not interoperable. The TLS protocol does contain a mechanism that allows TLS implementation to back down to SSL 3.0. The most recent browser versions support TLS. The TLS Working Group, established in 1996, continues to work on the TLS protocol and related applications.
#44
Chat Box / Re: quiz: "Messaging and E-Mail"
Nov 19, 2008, 03:13 PM
Email Security ANSWERS

ANSWER FOR 7

A directory harvest attack (DHA) is an attempt to determine the valid e-mail addresses associated with an e-mail server so that they can be added to a spam database.

A directory harvest attack can use either of two methods for harvesting valid e-mail addresses. The first method uses a brute force approach to send a message to all possible alphanumeric combinations that could be used for the username part of an e-mail at the server, up to and including those of length n characters (where n is some preset positive integer such as 15). The second and more selective method involves sending a message to the most likely usernames - for example, for all possible combinations of first initials followed by common surnames. In either case, the e-mail server generally returns a "Not found" reply message for all messages sent to a nonexistent address, but does not return a message for those sent to valid addresses. The DHA program creates a database of all the e-mail addresses at the server that were not returned during the attack.

The DHA approach explains how a new e-mail address can start receiving spam within days or hours after its creation. Various solutions have been developed toward repelling these attacks. Some of the most effective involve slowing down the rate at which the attack can take place, rather than attempting to filter out the entire attack. This can be done by limiting the number of e-mail messages per minute or per hour at which a server can receive messages, legitimate or otherwise. So-called spam filters, programmed to identify character and word combinations typical of spam, can also be effective, although they occasionally reject legitimate messages.
#45
Chat Box / Re: quiz: "Messaging and E-Mail"
Nov 19, 2008, 03:12 PM
Email Security ANSWERS

ANSWER FOR 6

Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients. Typically, the messages appear to come from well known and trustworthy Web sites. Web sites that are frequently spoofed by phishers include PayPal, eBay, MSN, Yahoo, BestBuy, and America Online. A phishing expedition, like the fishing expedition it's named for, is a speculative venture: the phisher puts the lure hoping to fool at least a few of the prey that encounter the bait.

Phishers use a number of different social engineering and e-mail spoofing ploys to try to trick their victims. In one fairly typical case before the Federal Trade Commission (FTC), a 17-year-old male sent out messages purporting to be from America Online that said there had been a billing problem with recipients' AOL accounts. The perpetrator's e-mail used AOL logos and contained legitimate links. If recipients clicked on the "AOL Billing Center" link, however, they were taken to a spoofed AOL Web page that asked for personal information, including credit card numbers, personal identification numbers (PINs), social security numbers, banking numbers, and passwords. This information was used for identity theft.

The FTC warns users to be suspicious of any official-looking e-mail message that asks for updates on personal or financial information and urges recipients to go directly to the organization's Web site to find out whether the request is legitimate. If you suspect you have been phished, forward the e-mail to spam@uce.gov or call the FTC help line, 1-877-FTC-HELP.
#46
Chat Box / Re: quiz: "Messaging and E-Mail"
Nov 19, 2008, 03:11 PM
Email Security ANSWERS

ANSWER FOR 5

acceptable use policy

An acceptable use policy (AUP) is a policy that a user must agree to follow in order to be provided with access to a network or to the Internet. It is common practice for many businesses and educational facilities to require that employees or students sign an acceptable use policy before being granted a network ID.

When you sign up with an Internet service provider ( ISP ), you will usually be presented with an AUP, which states that you agree to adhere to stipulations such as:

    * Not using the service as part of violating any law
    * Not attempting to break the security of any computer network or user
    * Not posting commercial messages to Usenet groups without prior permission
    * Not attempting to send junk e-mail or spam to anyone who doesn't want to receive it
    * Not attempting to mail bomb a site with mass amounts of e-mail in order to flood their server

Users also typically agree to report any attempt to break into their accounts.
#47
Chat Box / Re: quiz: "Messaging and E-Mail"
Nov 19, 2008, 03:11 PM
Email Security ANSWERS

ANSWER FOR 4

Sender ID is Microsoft's proposed e-mail sender authentication protocol designed to protect against domain spoofing and phishing exploits. The Sender ID Framework, as Microsoft calls it, comprises three separate specifications: Sender Policy Framework (SPF), Caller ID for e-mail, and Submitter Optimization. Briefly, here's how it works: The Domain Name System (DNS) maintains SPF records for domains. When an e-mail message is received by the inbound mail server, the server looks up the sending domain's published DNS record and determines whether the sending server's IP address matches the one on record. If the record matches, the e-mail is authenticated and delivered to the recipient; otherwise, the message is either discarded or returned to the sender as bounce e-mail.

Domain spoofing is often used to make recipients think that a fraudulent message comes from a legitimate source; the sender is likely to be phishing (pronounced fishing) for information that will give them access to the recipient's resources, such as credit card numbers, user names, and passwords. These messages often purport to come from well-known companies; AOL, BestBuy, MSN, PayPal, and Yahoo have all been imitated. When the attacker pretends to represent a well-known company, the exploit is sometimes called a brand spoof
#48
Chat Box / Re: quiz: "Messaging and E-Mail"
Nov 19, 2008, 03:11 PM
Email Security ANSWERS

ANSWER FOR 3

A spam filter is a program that is used to detect unsolicited and unwanted email and prevent those messages from getting to a user's inbox. Like other types of filtering programs, a spam filter looks for certain criteria on which it bases judgments. For example, the simplest and earliest versions (such as the one available with Microsoft's Hotmail) can be set to watch for particular words in the subject line of messages and to exclude these from the user's inbox. This method is not especially effective, too often omitting perfectly legitimate messages (these are called false positives) and letting actual spam through. More sophisticated programs, such as Bayesian filters or other heuristic filters, attempt to identify spam through suspicious word patterns or word frequency
#49
Chat Box / Re: quiz: "Messaging and E-Mail"
Nov 19, 2008, 03:11 PM
Email Security ANSWERS

ANSWER FOR 2

Anonymous e-mail is e-mail that has been directed to a recipient through a third-party server that does not identify the originator of the message.
#50
Chat Box / Re: quiz: "Messaging and E-Mail"
Nov 19, 2008, 03:09 PM
Email Security ANSWERS

ANSWER FOR 1

S/MIME (Secure Multi-Purpose Internet Mail Extensions) is a secure method of sending e-mail that uses the Rivest-Shamir-Adleman encryption system. S/MIME is included in the latest versions of the Web browsers from Microsoft and Netscape and has also been endorsed by other vendors that make messaging products. RSA has proposed S/MIME as a standard to the Internet Engineering Task Force (IETF). An alternative to S/MIME is PGP/MIME, which has also been proposed as a standard.

MIME itself, described in the IETF standard called Request for Comments 1521, spells out how an electronic message will be organized. S/MIME describes how encryption information and a digital certificate can be included as part of the message body. S/MIME follows the syntax provided in the Public-Key Cryptography Standard format #7.
#51
Chat Box / Re: QUIZ:"Storage"
Nov 19, 2008, 03:05 PM
Business continuity plan quiz ANSWERS

1)If you answered deciding which of the organization's functions are essential and apportioning the available budget accordingly, you are correct.

2)If you answered disaster recovery plan, you are correct.

3)If you answered business resumption plan, you are correct.

4)If you answered business recovery plan, you are correct.

5)If you answered disk mirroring, you are correct.

6)If you answered disk mirroring, you are correct.

#52
Chat Box / Re: quiz:"Virtualization"
Nov 19, 2008, 11:18 AM
Quiz: Virtual virtuosity ANSWERS

ANSWER FOR 10

Server consolidation is an approach to the efficient usage of computer server resources in order to reduce the total number of servers or server locations that an organization requires. The practice developed in response to the problem of server sprawl, a situation in which multiple, under-utilized servers take up more space and consume more resources than can be justified by their workload.

According to Tony Iams, Senior Analyst at D.H. Brown Associates Inc. in Port Chester, NY, servers in many companies typically run at 15-20% of their capacity, which may not be a sustainable ratio in the current economic environment. Businesses are increasingly turning to server consolidation as one means of cutting unnecessary costs and maximizing return on investment (ROI) in the data center. Of 518 respondents in a Gartner Group research study, six percent had conducted a server consolidation project, 61% were currently conducting one, and 28% were planning to do so in the immediate future.

Although consolidation can substantially increase the efficient use of server resources, it may also result in complex configurations of data, applications, and servers that can be confusing for the average user to contend with. To alleviate this problem, server virtualization may be used to mask the details of server resources from users while optimizing resource sharing. Another approach to server consolidation is the use of blade servers to maximize the efficient use of space.
#53
Chat Box / Re: quiz:"Virtualization"
Nov 19, 2008, 11:18 AM
Quiz: Virtual virtuosity ANSWERS

ANSWER FOR 9

A hypervisor, also called a virtual machine manager, is a program that allows multiple operating systems to share a single hardware host. Each operating system appears to have the host's processor, memory, and other resources all to itself. However, the hypervisor is actually controlling the host processor and resources, allocating what is needed to each operating system in turn and making sure that the guest operating systems (called virtual mahines) cannot disrupt each other.
#54
Chat Box / Re: quiz:"Virtualization"
Nov 19, 2008, 11:14 AM
Quiz: Virtual virtuosity ANSWERS

ANSWER FOR 8

Virtualization is the pooling of physical storage from multiple network storage devices into what appears to be a single storage device that is managed from a central console. Storage virtualization is commonly used in a storage area network (SAN). The management of storage devices can be tedious and time-consuming. Storage virtualization helps the storage administrator perform the tasks of backup, archiving, and recovery more easily, and in less time, by disguising the actual complexity of the SAN.

Users can implement virtualization with software applications or by using hardware and software hybrid appliances. The technology can be placed on different levels of a storage area network.
#55
Chat Box / Re: quiz:"Virtualization"
Nov 19, 2008, 11:13 AM
Quiz: Virtual virtuosity ANSWERS

ANSWER FOR 7

Virtual PC is a program that emulates Windows 95, Windows 98, Windows NT, as well as IBM OS/2, or Linux on a Macintosh personal computer, assuming it's equipped with a sufficiently fast microprocessor. With Virtual PC installed, a Mac can show the desktop for the emulated operating system on one part of the display or it can take up the entire screen. You can run any program that will run under the other operating systems on "regular" (Intel microprocessor-based) PCs. Virtual PC works by converting Intel x86 instructions into PowerPC instructions on the fly.

To install and use Virtual PC, the Mac must have the PowerPC 604e microprocessor, or a 603e version that runs at a minimum of 180 MHz. An extra 150 to 300 megabytes of hard disk storage is needed and you should have at least 24 megabytes of random access memory (RAM) with 32 megabytes recommended. Versions of Virtual PC are available that will emulate Windows 3.1 and DOS; these can run with a slower microprocessor and less storage.

Virtual PC may be helpful for Mac users who need to run a Windows program occasionally or in families where some members want to run Mac applications and other members want to run Windows applications. According to a Wall Street Journal reviewer, the emulation appears to be complete, except that the Mac mouse, which has only one button, requires the user to press an additional key when a right-hand click is required.
#56
Chat Box / Re: quiz:"Virtualization"
Nov 19, 2008, 11:13 AM
Quiz: Virtual virtuosity ANSWERS

ANSWER FOR 6

Grid computing (or the use of a computational grid) is applying the resources of many computers in a network to a single problem at the same time - usually to a scientific or technical problem that requires a great number of computer processing cycles or access to large amounts of data. A well-known example of grid computing in the public domain is the ongoing SETI (Search for Extraterrestrial Intelligence) @Home project in which thousands of people are sharing the unused processor cycles of their PCs in the vast search for signs of "rational" signals from outer space. According to John Patrick, IBM's vice-president for Internet strategies, "the next big thing will be grid computing."

Grid computing requires the use of software that can divide and farm out pieces of a program to as many as several thousand computers. Grid computing can be thought of as distributed and large-scale cluster computing and as a form of network-distributed parallel processing. It can be confined to the network of computer workstations within a corporation or it can be a public collaboration (in which case it is also sometimes known as a form of peer-to-peer computing).

A number of corporations, professional groups, university consortiums, and other groups have developed or are developing frameworks and software for managing grid computing projects. The European Community (EU) is sponsoring a project for a grid for high-energy physics, earth observation, and biology applications. In the United States, the National Technology Grid is prototyping a computational grid for infrastructure and an access grid for people. Sun Microsystems offers Grid Engine software. Described as a distributed resource management (DRM) tool, Grid Engine allows engineers at companies like Sony and Synopsys to pool the computer cycles on up to 80 workstations at a time. (At this scale, grid computing can be seen as a more extreme case of load balancing.)

Grid computing appears to be a promising trend for three reasons: (1) its ability to make more cost-effective use of a given amount of computer resources, (2) as a way to solve problems that can't be approached without an enormous amount of computing power, and (3) because it suggests that the resources of many computers can be cooperatively and perhaps synergistically harnessed and managed as a collaboration toward a common objective. In some grid computing systems, the computers may collaborate rather than being directed by one managing computer. One likely area for the use of grid computing will be pervasive computing applications - those in which computers pervade our environment without our necessary awareness.
#57
Chat Box / Re: quiz:"Virtualization"
Nov 19, 2008, 11:12 AM
Quiz: Virtual virtuosity ANSWERS

ANSWER FOR 5

PowerPC is a microprocessor architecture that was developed jointly by Apple, IBM, and Motorola. The PowerPC employs reduced instruction-set computing (RISC). The three developing companies have made the PowerPC architecture an open standard, inviting other companies to build on it.

Developed at IBM, reduced instruction-set computing (RISC) is based on studies showing that the simplest computer instructions are the ones most frequently performed. Traditionally, processors have been designed to accommodate the more complex instructions as well. RISC performs the more complex instructions using combinations of simple instructions. The timing for the processor can then be based on simpler and faster operations, enabling the microprocessor to perform more instructions for a given clock speed.

The PowerPC architecture provides an alternative to the popular processor architectures from Intel, including the Pentium. (Microsoft builds its Windows operating system offerings to run on Intel processors, and this widely-sold combination is sometimes called "Wintel".) The PowerPC was first used in IBM's RS/6000 workstation with its Unix-based operating system, AIX, and in Apple Computer's Macintosh personal computers. Today, PowerPC chips are also used in diverse applications including internetworking equipment, routers, telecom switches, interactive multimedia, automotive control, and industrial robotics.
#58
Chat Box / Re: quiz:"Virtualization"
Nov 19, 2008, 11:11 AM
Quiz: Virtual virtuosity ANSWERS

ANSWER FOR 4

x86 is a generic name for the series of Intel microprocessor families that began with the 80286 microprocessor. This series has been the provider of computing for personal computers since the 80286 was introduced in 1982. x86 microprocessors include the 386DX/SX/SL family, the 486DX/SX//DX2/SL/DX4 family, and the Pentium 3 family. The x86 line replaced Intel's previous series, the 8086/8088. Adopted by IBM for its first PCs, the 8086/8088 and the continuing x86 series have made Intel the predominant force in microprocessor design and manufacture.
#59
Chat Box / Re: quiz:"Virtualization"
Nov 19, 2008, 11:11 AM
Quiz: Virtual virtuosity ANSWERS

ANSWER FOR 3

In information technology, scalability (frequently spelled scaleability) seems to have two usages:

1) It is the ability of a computer application or product (hardware or software) to continue to function well when it (or its context) is changed in size or volume in order to meet a user need. Typically, the rescaling is to a larger size or volume. The rescaling can be of the product itself (for example, a line of computer systems of different sizes in terms of storage, RAM, and so forth) or in the scalable object's movement to a new context (for example, a new operating system).

An example: John Young in his book Exploring IBM's New-Age Mainframes describes the RS/6000 SP operating system as one that delivers scalability ("the ability to retain performance levels when adding additional processors"). Another example: In printing, scalable fonts are fonts that can be resized smaller or larger using software without losing quality.

2) It is the ability not only to function well in the rescaled situation, but to actually take full advantage of it. For example, an application program would be scalable if it could be moved from a smaller to a larger operating system and take full advantage of the larger operating system in terms of performance (user response time and so forth) and the larger number of users that could be handled.

It is usually easier to have scalability upward rather than downward since developers often must make full use of a system's resources (for example, the amount of disk storage available) when an application is initially coded. Scaling a product downward may mean trying to achieve the same results in a more constrained environment.
#60
Chat Box / Re: quiz:"Virtualization"
Nov 19, 2008, 11:10 AM
Quiz: Virtual virtuosity ANSWERS

ANSWER FOR 2

SPARC (Scalable Processor Architecture) is a 32- and 64-bit microprocessor architecture from Sun Microsystems that is based on reduced instruction set computing (RISC). SPARC has become a widely-used architecture for hardware used with Unix-based operating systems, including Sun's own Solaris systems. Sun has made SPARC an open architecture that is available for licensing to microprocessor manufacturers. In its most recent brand name, UltraSPARC, microprocessors can be built for PC boards (using either Peripheral Component Interconnect or ATX) as well as for SPARC's original workstation market. As evidence of SPARC's scalability, Sun says that its UltraSPARC III will be designed to allow up to 1,000 processors to work together.

Although the idea of RISC is sometimes attributed to IBM's John Cocke, Sun Microsystems was the first to provide a microprocessor that exploited it for the workstation market and it's possible to say that, together with Unix, SPARC created the workstation market. (IBM has since used it in its successful RISC System/6000 line of workstations.) Since its inception in 1987, the SPARC architecture has included these ideas:

    * Reduce the number of instructions that the processor has to perform to a minimal number (one idea of RISC is that a complex instruction in a conventional computer can be reduced to a series of simpler operations, requiring a simpler architecture and a more compact microprocessor)
    * Reduce the number of types of memory addresses that the processor needs to handle
    * Put as little processor operation as possible in microcode, which requires clock speed-consuming time to access
    * Provide language compilers that compile programs that are optimized for a SPARC microprocessor by being arranged in an order that the processor can handle more efficiently

Sun's UltraSPARC III is expected to run at over 600 MHz, competing with Intel's Merced microprocessor. Sun says that it is aiming for a 1.5 gigahertz processor in 2002.
#61
Chat Box / Re: quiz:"Virtualization"
Nov 19, 2008, 11:09 AM
Quiz: Virtual virtuosity ANSWERS

ANSWER FOR 1

performance

Performance seems to have two meanings:

1) The speed at which a computer operates, either theoretically (for example, using a formula for calculating Mtops - millions of theoretical instructions per second) or by counting operations or instructions performed (for example, ( MIPS ) - millions of instructions per second) during a benchmark test. The benchmark test usually involves some combination of work that attempts to imitate the kinds of work the computer does during actual use. Sometimes performance is expressed for each of several different benchmarks.

2) The total effectiveness of a computer system, including throughput , individual response time , and availability.
#62
Chat Box / Re: quiz:"Virtualization"
Nov 19, 2008, 11:01 AM
Virtual LAN quiz ANSWERS

ANSWER FOR 10

WAN

A wide area network (WAN) is a geographically dispersed telecommunications network. The term distinguishes a broader telecommunication structure from a local area network (LAN). A wide area network may be privately owned or rented, but the term usually connotes the inclusion of public (shared user) networks. An intermediate form of network in terms of geography is a metropolitan area network (MAN).
#63
Chat Box / Re: quiz:"Virtualization"
Nov 19, 2008, 11:01 AM
Virtual LAN quiz ANSWERS

ANSWER FOR 9

router

In packet-switched networks such as the Internet, a router is a device or, in some cases, software in a computer, that determines the next network point to which a packet should be forwarded toward its destination. The router is connected to at least two networks and decides which way to send each information packet based on its current understanding of the state of the networks it is connected to. A router is located at any gateway (where one network meets another), including each point-of-presence on the Internet. A router is often included as part of a network switch.
#64
Chat Box / Re: quiz:"Virtualization"
Nov 19, 2008, 11:00 AM
Virtual LAN quiz ANSWERS

ANSWER FOR 8

IEEE

The IEEE (Institute of Electrical and Electronics Engineers) describes itself as "the world's largest technical professional society -- promoting the development and application of electrotechnology and allied sciences for the benefit of humanity, the advancement of the profession, and the well-being of our members."

The IEEE fosters the development of standards that often become national and international standards. The organization publishes a number of journals, has many local chapters, and several large societies in special areas, such as the IEEE Computer Society.
#65
Chat Box / Re: quiz:"Virtualization"
Nov 19, 2008, 11:00 AM
Virtual LAN quiz ANSWERS

ANSWER FOR 7

A packet is the unit of data that is routed between an origin and a destination on the Internet or any other packet-switched network. When any file (e-mail message, HTML file, Graphics Interchange Format file, Uniform Resource Locator request, and so forth) is sent from one place to another on the Internet, the Transmission Control Protocol (TCP) layer of TCP/IP divides the file into "chunks" of an efficient size for routing. Each of these packets is separately numbered and includes the Internet address of the destination. The individual packets for a given file may travel different routes through the Internet. When they have all arrived, they are reassembled into the original file (by the TCP layer at the receiving end).

A packet-switching scheme is an efficient way to handle transmissions on a connectionless network such as the Internet. An alternative scheme, circuit-switched, is used for networks allocated for voice connections. In circuit-switching, lines in the network are shared among many users as with packet-switching, but each connection requires the dedication of a particular path for the duration of the connection.

"Packet" and "datagram" are similar in meaning. A protocol similar to TCP, the User Datagram Protocol(UDP) uses the term datagram.
#66
Chat Box / Re: quiz:"Virtualization"
Nov 19, 2008, 10:59 AM
Virtual LAN quiz ANSWERS

ANSWER FOR 6

Mbps

Mbps is not to be confused with MBps (megabytes per second). Also see Kilo, mega, giga, tera, peta, and all that.

Mbps stands for millions of bits per second or megabits per second and is a measure of bandwidth (the total information flow over a given time) on a telecommunications medium. Depending on the medium and the transmission method, bandwidth is also sometimes measured in the Kbps (thousands of bits or kilobits per second) range or the Gbps (billions of bits or gigabits per second) range.

A megabit is a million binary pulses, or 1,000,000 (that is, 106) pulses (or "bits"). For example, a U.S. phone company T-carrier system line is said to sustain a data rate of 1.544 megabits per second. Megabits per second is usually shortened to Mbps.

Some sources define a megabit to mean 1,048,576 (that is, 220) bits. Although the bit is a unit of the binary number system, bits in data communications are discrete signal pulses and have historically been counted using the decimal number system. For example, 28.8 kilobits per second (Kbps) is 28,800 bits per second. Because of computer architecture and memory address boundaries, bytes are always some multiple or exponent of two. See kilobyte, etc.
#67
Chat Box / Re: quiz:"Virtualization"
Nov 19, 2008, 10:58 AM
Virtual LAN quiz ANSWERS

ANSWER FOR 5

switch

In a telecommunications network, a switch is a device that channels incoming data from any of multiple input ports to the specific output port that will take the data toward its intended destination. In the traditional circuit-switched telephone network, one or more switches are used to set up a dedicated though temporary connection or circuit for an exchange between two or more parties. On an Ethernet local area network (LAN), a switch determines from the physical device (Media Access Control or MAC) address in each incoming message frame which output port to forward it to and out of. In a wide area packet-switched network such as the Internet, a switch determines from the IP address in each packet which output port to use for the next part of its trip to the intended destination.

In the Open Systems Interconnection (OSI) communications model, a switch performs the layer 2 or Data-Link layer function. That is, it simply looks at each packet or data unit and determines from a physical address (the "MAC address") which device a data unit is intended for and switches it out toward that device. However, in wide area networks such as the Internet, the destination address requires a look-up in a routing table by a device known as a router. Some newer switches also perform routing functions (layer 3 or the Network layer functions in OSI) and are sometimes called IP switches.

On larger networks, the trip from one switch point to another in the network is called a hop. The time a switch takes to figure out where to forward a data unit is called its latency. The price paid for having the flexibility that switches provide in a network is this latency. Switches are found at the backbone and gateway levels of a network where one network connects with another and at the subnetwork level where data is being forwarded close to its destination or origin. The former are often known as core switches and the latter as desktop switches.

In the simplest networks, a switch is not required for messages that are sent and received within the network. For example, a local area network may be organized in a Token Ring or bus arrangement in which each possible destination inspects each message and reads any message with its address.
#68
Chat Box / Re: quiz:"Virtualization"
Nov 19, 2008, 10:57 AM
Virtual LAN quiz ANSWERS

ANSWER FOR 4

MAC address

In a local area network (LAN) or other network, the MAC (Media Access Control) address is your computer's unique hardware number. (On an Ethernet LAN, it's the same as your Ethernet address.) When you're connected to the Internet from your computer (or host as the Internet protocol thinks of it), a correspondence table relates your IP address to your computer's physical (MAC) address on the LAN.

The MAC address is used by the Media Access Control sublayer of the Data-Link Layer (DLC) of telecommunication protocols. There is a different MAC sublayer for each physical device type. The other sublayer level in the DLC layer is the Logical Link Control sublayer.
#69
Chat Box / Re: quiz:"Virtualization"
Nov 19, 2008, 10:57 AM
Virtual LAN quiz ANSWERS

ANSWER FOR 3

millisecond

(This definition follows U.S. usage in which a billion is a thousand million and a trillion is a 1 followed by 12 zeros.)

A millisecond (ms or msec) is one thousandth of a second and is commonly used in measuring the time to read to or write from a hard disk or a CD-ROM player or to measure packet travel time on the Internet.

For comparison, a microsecond (us or Greek letter mu plus s) is one millionth (10-6) of a second.

A nanosecond (ns or nsec) is one billionth (10-9) of a second and is a common measurement of read or write access time to random access memory (RAM).

A picosecond is one trillionth (10-12) of a second, or one millionth of a microsecond.

A femtosecond is one millionth of a nanosecond or 10-15 of a second and is a measurement sometimes used in laser technology.

An attosecond is one quintillionth (10-18) of a second and is a term used in photon research.
#70
Chat Box / Re: quiz:"Virtualization"
Nov 19, 2008, 10:54 AM
Virtual LAN quiz ANSWERS

ANSWER FOR 2

A virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network. A virtual private network can be contrasted with an expensive system of owned or leased lines that can only be used by one organization. The goal of a VPN is to provide the organization with the same capabilities, but at a much lower cost
#71
Chat Box / Re: quiz:"Virtualization"
Nov 19, 2008, 10:52 AM
Virtual LAN quiz ANSWERS

ANSWER FOR 1

A packet is the unit of data that is routed between an origin and a destination on the Internet or any other packet-switched network. When any file (e-mail message, HTML file, Graphics Interchange Format file, Uniform Resource Locator request, and so forth) is sent from one place to another on the Internet, the Transmission Control Protocol (TCP) layer of TCP/IP divides the file into "chunks" of an efficient size for routing. Each of these packets is separately numbered and includes the Internet address of the destination. The individual packets for a given file may travel different routes through the Internet. When they have all arrived, they are reassembled into the original file (by the TCP layer at the receiving end).

A packet-switching scheme is an efficient way to handle transmissions on a connectionless network such as the Internet. An alternative scheme, circuit-switched, is used for networks allocated for voice connections. In circuit-switching, lines in the network are shared among many users as with packet-switching, but each connection requires the dedication of a particular path for the duration of the connection.

"Packet" and "datagram" are similar in meaning. A protocol similar to TCP, the User Datagram Protocol(UDP) uses the term datagram.
#72
oh sorry,

i want this word's meaning "thiyaagi" in english

thank u  acumen , for helping me.[that's the word id already inside]
#73
mavattam-district
#74
beach/tourist place-GOA
#75
expect the unexpected
#76
Chat Box / Re: Find As Many As Possible
Nov 18, 2008, 09:09 PM
tourist place-GOA
#77
Chat Box / Re: quiz:"Virtualization"
Nov 18, 2008, 03:29 PM
Newsmaker quiz ANSWERS

ANSWER FOR 10

Because both Windows and Linux support it, VMware is the best virtualization solution for heterogeneous environments, say the authors of Advanced Server Virtualization: VMware and Microsoft Platforms in the Virtual Data Center. In this interview, David Marshall and Wade Reynolds offer their advice on what to do in heterogeneous environments, explain why they believe VMware trumps Microsoft Virtual Server and give their suggestions for useful management tools. For customers in a heterogeneous ...
#78
Chat Box / Re: quiz:"Virtualization"
Nov 18, 2008, 03:29 PM
Newsmaker quiz ANSWERS

ANSWER FOR 9

Developers are intimately familiar with source control, so for them, software like Subversion is old news. For the rest of you who may have never heard of it before, Subversion is a source control system -- a piece of software that allows you and/or a group of people to manage data over time, recover previous versions of the data and examine the evolution of that data.

Some of you will see the immediate benefit to having such software to help manage scripts that you use in the COS. Then again, a large percentage of people reading this will wonder, "Why should I care about Subversion when the COS comes installed with CVS?" The answer to this question is the same as the answer to why people use Subversion as opposed to CVS in any situation: Subversion has more features than CVS and is better suited (for some) to today's development practices. For a detailed comparison, please see http://wiki.gnuarch.org/SubVersionAndCvsComparison. This is not a discussion that I am going to have here. If you are a fan of CVS, then use CVS, but if you want to know how to use Subversion with ESX, then follow me!

Installing Subversion for ESX takes just 6 steps:

1) In your favorite browser go to the.earth.li/pub/subversion/summersoft.fay.ar.us/pub/subversion/latest/redhat-7.x/bin/ and download the following RPMs:
apache-libapr-2.0.48-0.1.i386.rpm
neon-0.24.7-1.i386.rpm
db4-4.0.14-0.4.i386.rpm
libxml2-2.5.4-1.i386.rpm
subversion-1.3.1-1.rh7x.i386.rpm

2) Jump to the URL rpm.pbone.net/index.php3/stat/4/idpl/1070466/com/expat-libs-1.95.7-7tr.i586.rpm.html and download the following RPM:
expat-libs-1.95.7-7tr.i586.rpm

3) Upload these RPMs to your ESX server using whatever means you wish.

4) SSH into ESX.

5) Change directories to the location where you uploaded the RPMs.

6) Type the following command:
sudo rpm -ivh --nodep *.rpm

That's it! You have now installed the core files necessary to operate the subversion client tools. Notice the "nodep" option in step 6. This is required because parts of Subversion actually require many more dependencies and we need to tell the RPM installer to skip, but for the tools that we want to use, "svn" and "svnadmin", the 6 packages will provide the necessary files for these tools to operate without error.
#79
Chat Box / Re: quiz:"Virtualization"
Nov 18, 2008, 03:28 PM
Newsmaker quiz ANSWERS

ANSWER FOR 8

As an independent IT consultant and subcontractor, Paul Winkeler is in the field regularly, helping IT managers find new ways to make their data center run more efficiently. As the owner of Ohio-based PBnJ Solutions, Winkeler recently began using virtualization as part of a disaster recovery (DR) plan for one of his clients and spoke with SearchServerVirtualization about the solution.
   
Virtualization technology is very popular for server consolidation, but what else can it be used for?

The concept of using virtualization in a disaster recovery environment is very high on the list. In the past, it has been expensive to get one server to replicate to the other because those two servers had to be basically identical for complete replication. In order for them to be identical, you needed the same hardware in both the main and backup locations. With virtualization, those hardware costs are cut down significantly because of the ability to host several machines on one server.

Can you give us an example of how virtualization can be used for DR?

One of my customers is a large investment company that uses SQL Server 2000 to track client activity. They need this information to be available at all times. We are doing something different for this client using virtualization to replicate that data. We have Microsoft Virtual Servers; one at the main site and one at a backup site. The virtual servers have virtual disk drives and we are using a product called LifeKeeper from Steeleye Technologies, Inc. to replicate the virtual drives back and forth. Anytime there is a change, the product reports the information to both servers, so the data is always up-to-date.

What are the advantages of using virtualization in this scenario as opposed to going with a more traditional DR solution?

For starters, one advantage to using virtual servers instead of physical servers is in the testing. When we were building the test environment, we basically had two virtual servers running on the same hardware. So we built the whole test environment at the client's home office without having to worry about having high speed connection between the home office and the backup site. I could just do all the testing locally.

Now that the servers are up and running, another advantage to having the data virtualized is that I can now test more frequently than I can with physical servers. With physical servers, testing is often painful and something that we try to avoid. Using virtual servers, it is easy for us to test because we can shut down and turn on these virtual servers easily. We can simulate server failure just by shutting them down. We don't need remote hardware access to power down

Any other additional cost savings you have seen using virtualization for DR?

I already mentioned hardware, but there are additional savings in that area. At the customer's main site, we have a ratio of 2 or 3 virtual servers per physical machine. But at the mirror site, we boost that ratio higher because most of the time those servers are really not doing anything mission critical; they are just sitting there on standby. This conserves the amount of money we have to tie up in a backup site. Previously, before we starting using virtual servers, there was a lot of capital tied up in the backup site that wasn't really necessary.

There is also a savings when it comes to personnel because virtual environments can be managed remotely, so we need much less personnel working on the management of the machines and they can now be used for other tasks.
#80
Chat Box / Re: quiz:"Virtualization"
Nov 18, 2008, 03:27 PM
Newsmaker quiz ANSWERS

ANSWER FOR 7

After years of finding limited opportunities for job advancement in the IT sector, a recent industry poll shows that there is now some movement afoot when it comes to job prospects.

The Computing Technology Industry Association, or CompTIA, based in Oakbrook Terrace, Ill., released a poll of 1,000 high tech workers, including those who work in IT. CompTIA is an IT industry trade association.

A few years ago the high tech job sector was shedding jobs in such numbers that many people had to go into other fields to find work, and in the case of many older workers, they remain unemployed or under employed in unrelated fields.

The number of high tech jobs began to nose dive in 2000, along with the numbers in other industries when the United States experienced an official recession followed by an economy that remained sluggish.
            
Fifty-eight percent of the 1,000 people polled said they were looking for a new job.         

"The evidence we received anecdotally from high tech people, which includes IT workers, is that they now believe the market for tech jobs is loosening up," said Steven Ostrowski, an association representative.

Fifty-eight percent of the 1,000 people polled said they were looking for a new job. Higher pay overwhelmingly topped the list with 73% of those job hunters hoping to land a higher-paying job.

Sixty-four percent said they were looking because their current job held no chance for advancement, while 58% said they wanted a new challenge. And 41% said they would like better benefits.

A total of 61% said they were looking either because they didn't respect the management or the company where they were working, or their management did not respect them.

Almost 22% would like to find a less stressful job, and almost 35% want a job that helps pay for some or all of their professional education.

CompTIA prepared the survey after the association ran a one-question poll asking if high tech workers were looking to change jobs, Ostrowski said. "The feedback we got was so high we figured we should look into it a bit more closely," he said, adding that the association will likely follow up on the poll in a year.

And while CompTIA did not ask those it surveyed for job titles, it did ask them to name the industries where they worked. A quarter of the 1,000 workers polled work in IT companies, which includes computer companies as well as value-added resellers. Sixteen percent work in education, 15% in government, 8% in healthcare and 7% in manufacturing.
#81
Chat Box / Re: quiz:"Virtualization"
Nov 18, 2008, 03:27 PM
Newsmaker quiz ANSWERS

ANSWER FOR 6

Data center administrators are too conservative to let virtual machine (VM) deployments snowball into a much-ballyhooed sprawl, said VMware Inc. director of data center products Patrick Lin. The real sprawl will take place off the production line in test environments.

Of course, VM deployments in data centers will increase, but automated management tools -- such as those contained in the new VMware Virtual Infrastructure 3 (VI3) -- will keep provisioning and management in hand, Lin said in this interview with SearchServerVirtualization.com.

Lin also described beta testers' reactions to the automated management tools in VI3. The new platform contains existing products ESX Server, Virtual SMP and VirtualCenter. (The latter includes VMotion, which lets you move VMs around a set of physical servers automatically without downtime.) New additions are a distributed file system for managing VMs, VMFS; VMware Distributed Resource Scheduler; VMware High Availability (HA); and VMware Consolidated Backup.
#82
Chat Box / Re: quiz:"Virtualization"
Nov 18, 2008, 03:26 PM
Newsmaker quiz ANSWERS

ANSWER FOR 5

Virtualization technology has saved an Illinois-based truck manufacturer more than $1 million in hardware costs.

Barry Naber, IT manager for International Truck and Engine Corp. in Warrenville, Ill., has reduced physical server purchases with virtualization. The company has saved $7,500 for each virtual machine running.
            
International Truck now has 18 ESX servers running a total of 217 virtual machines . . . That adds up to $1,627,500 in server costs that were avoided.

Initially, the company looked into virtualization to alleviate a growth problem. Naber wanted to put a lid on the number of servers in his environment. "We had too many servers," he said. "Space wasn't really the big issue; there were just an overwhelming number of physical servers to manage."

Naber said he was sure that as business grew, the number of applications needed in his data center would, too, and he wanted a plan for the future that would reduce server sprawl and keep hardware costs down. He looked at blade servers but decided that blades, while smaller in size than traditional rack-mounted servers, did not cut down on the actual physical number of boxes in the server room.

"Our goal was to reduce the number of servers we had, and blades don't do that, so they couldn't help us with our goal," Naber said.

Naber started with just one copy of VMware Inc's ESX server software in 2002, in test mode only. After virtualizing several applications for a few months, Naber was impressed enough with the performance to start using ESX server in production scenarios as well.
   
International Truck now has 18 ESX servers running a total of 217 virtual machines on a combination of four- and eight-processor IBM X Series and HP ProLiant servers. That adds up to $1,627,500 in server costs that were avoided.

The physical servers host 200 different applications and several Windows operating systems, according to Naber. The only type of application Naber said he is not comfortable virtualizing is a database. He does not think large databases are a good fit for virtualization because of the overhead generated by their massive memory requirements.

Naber also uses virtualization to ensure applications are compatible. Applications are first deployed in development mode and then migrated into production only after extensive testing. "We now have both production and development partitions," he said. "This lets us test out upgrades and patches in a development environment before moving it into production."

Naber noted that cost savings in the server room were not immediate.

"Because the older Windows servers we were running are inexpensive to support, there wasn't a big cost savings when we were able to get rid of one," he said.

But cost avoidance is an obvious benefit that has been revealed over time, he said.
#83
Chat Box / Re: quiz:"Virtualization"
Nov 18, 2008, 03:25 PM
Newsmaker quiz ANSWERS

ANSWER FOR 4

A soon-to-be-released VMware Inc. product may please Mac users, but the virtualization offering will not do much to alleviate the pain IT administrators feel from having to manage multiple desktop platforms. Palo Alto-based VMware has said that a product that gives Mac users the ability to virtualize PC operating systems such as Windows and Linux on Mac OS X will be available later in the year.

The VMware product is not the first that aims to let users run Windows on Macs. Apple Corp. already has software in beta called Boot Camp, which allows Intel-based Macs to run either Windows or the Mac OS. However, Boot Camp does not let you run both systems at the same time. Another product, from a small start-up company called Parallels Inc., based in Herdon, Va., will compete more directly with VMware. The Parallels product uses virtualization technology to allow Windows to operate alongside Mac OS at the same time.

These software offerings come as welcome news for Mac users who would like to run Windows applications on an Apple computer, but they have little business value according to Mark Margevicius, a vice president and research director with Gartner Inc. in Stamford, Conn.

"There are some subsets of Mac users that have tools on both platforms, where they actually have a Mac on one side of the desk and a PC on other," he said. "In those types of instances this will assist in a big way. But, honestly, I've got to believe that is less than 1% of workers."

Nor will the VMware product expand Apple's presence in the enterprise, because Mac OS itself will continue to run only on Apple hardware. Apple confirmed it has no plans to sell, support or allow a virtualized version of Mac OS on non-Apple hardware.

That's consistent with Apple's strong proprietary history, Margevicius said. "They have always articulated that Mac is not a PC; it is an Apple platform, which they will own and control."

On the heels of the VMware announcement comes word from Microsoft that the software giant's Virtual PC for Mac, a product that allows Windows to run on Intel-based Macs, will be shelved. In a statement, Microsoft said it "has made the decision not to move forward with a universal version of Virtual PC at this time."

"Developing a high-quality virtualization solution, such as Virtual PC, for the Intel-based Mac is similar to creating a version 1.0 release due to how closely the product integrates with Mac hardware," the statement read.

Underground movement afoot

Virtualizing Mac OS X has been done on the sly among techies already, according to David Marshall, a virtualization analyst and a senior architect at Surgient Inc., which provides virtual lab applications. "Many have claimed to virtualize Mac OS X already on different platforms, but it certainly isn't supported. And I would bet that Apple would do more than just frown on it," he said.

So, for most IT managers, the stress of supporting both PCs and Macs just isn't worth it. John Hornbuckle, a network manager with the Taylor County School district in Perry, Fla., can attest that standardizing platforms and hardware can reduce IT management stress.

"When I was first hired here to oversee the district's technology, we had both Macs and PCs. One of my earliest goals was to change that," Hornbuckle said. "We've phased out virtually all Macs here, thankfully. Supporting multiple platforms was determined to not be cost-effective or necessary, and we became a PC shop a few years back."
#84
Chat Box / Re: quiz:"Virtualization"
Nov 18, 2008, 03:24 PM
Newsmaker quiz ANSWERS

ANSWER FOR 3

Blade servers are gaining respect among IT professionals and finding a place alongside virtualization in the quest to reduce the data center footprint.

New research from TheInfoPro (TIP) Inc., a New York IT consultancy, found that more organizations are looking seriously at blades for their server room and, in many instances, are deploying virtualization projects on blade servers.

The ongoing server study from TIP examines user experiences and their plans for the future in several areas, including use of virtualization, blade servers, server networking and server and systems management. The study asked questions about motivating factors for adoption and time frames for the deployment of various technologies.

The latest wave of research found that more than 85% of the 130 IT managers surveyed consider blade servers "valuable" or "critical" to their long-term data center plans. This differs dramatically from a previous survey conducted late last year. At that time, 25% of users said they saw little or no cost benefits in blades and did not see the slim servers as a priority purchase. In the most recent poll of users, negative responses about blades dropped to zero.

Bob Gill, chief research officer for TIP, said previous surveys uncovered disappointment in blades among users who were expecting more from the servers. The marketing hype did not match up with the product.

"Now, there is a shift toward pragmatism," Gill said. "People are beginning to embrace blades for what they are -- as simply an alterative form factor to x86 servers. They are not expecting an entirely new technology."

The research also revealed that consolidation is the top server priority among organizations. IT managers surveyed were using virtualization software and blade servers for server consolidation projects and many cited plans to virtualize on blades, said Gill. "Virtualization is still the hottest thing that has come along in a few years," he said. "But blades aren't taking a back seat anymore. There is an increased perception that not everything should be virtualized and there are some things that are more appropriate on blades."

Gill said users' plans are evenly split between scaling applications up through virtualization and scaling out via traditional standalone x86 servers or x86 blade servers.

Louis Foler, a consultant for systems retailer CDW Corp., in Vernon Hills, Ill., said most of his clients virtualize projects on new hardware.

"I like to sell virtualization software with blade servers because the blades are like a self-contained system on their own," Foler said. "Because of this design, these blade centers are like self-contained systems and work great with virtualization technology."
#85
Chat Box / Re: quiz:"Virtualization"
Nov 18, 2008, 03:23 PM
Newsmaker quiz ANSWERS

ANSWER FOR 2

Virtualization addresses the same problems, such as server glut and management complexity, as clustering does -- and it doesn't necessarily do a better job of solving them, according to cluster expert Don Becker.

That doesn't mean that clusters and virtualization are mutually exclusive and can't benefit from technology sharing, says Becker, co-founder of the Beowulf project -- a pioneering open source/Linux cluster development effort. He is also the CTO at Scyld Inc., the software division of Penguin Computing, a server vendor in San Francisco.

In this interview with SearchServerVirtualization.com, Becker describes the shortcomings of virtualization, its kinship with clustering and the marriage of the two in Scyld ClusterWare HPC 4.0 cluster virtualization software.
#86
Chat Box / Re: quiz:"Virtualization"
Nov 18, 2008, 03:23 PM
Newsmaker quiz ANSWERS

ANSWER FOR 1

Having entered the virtualization space late in the game, Microsoft is working hard to recover lost time.

So far, the Redmond giant's strategy has had three key moves. First, the company announced the Windows Server Virtualization hypervisor and System Center Virtual Machine Manager tool, two competitive products it hopes will challenge VMware Inc. for market leadership. Then, it acquired Softricity Inc., a recognized leader in application virtualization with its SoftGrid product. Finally, it entered into an agreement with XenSource Inc. for virtual machine interoperability between its hypervisor and the most famous open source virtualization platform, Xen.

This last step raised a lot of hackles in the virtualization industry, with reactions from many vendors, including VMware. Customers found themselves faced with uncertainty regarding conflicting information, the complexity of the migrations and the impact on business. Summarizing the key points of any problem always helps to clarify the issues, so here are the key elements in the Microsoft-Xen situation:

   1. Microsoft has been involved in the Xen project since the very beginning. SWsoft Inc. reports Microsoft's upcoming Windows Server Virtualization and Xen hypervisors have a similar architecture.

   2. Xen is open source.

   3. Microsoft Windows Server Virtualization will be out within two years.

   4. VMware has been proposing a virtualization standard for more than a year, but the work has severely slowed down because of differences of opinion, particularly with regard to the XenSource approach.

   5. VMware rarely comments on competitors' moves in the virtualization market, but in less than a day it reacted aggressively against the Microsoft-XenSource agreement.

   6. Xen is adopting a paravirtualization approach, involving guest operating system kernel modification, permitted only on open source platforms.

   7. With the new features inside AMD (SVM) and Intel (VT) processors, users can achieve the same capability to run operating systems with paravirtualization. In the future, new generations of this technology will be able to achieve the same performances.

   8. Virtual Iron Software Inc. publicly announced that its products would be based on Xen, but that the company will dismiss the paravirtualization approach.

   9. Novell released its new operating system with Xen but limited support to its own operating system for virtual machines.

  10. After the Microsoft-XenSource announcement and Novell operating system release, Red Hat Inc. suddenly warned that Xen is not ready for production, despite the big announcement of a comprehensive virtualization strategy on March.

Given these points, customers looking at Xen and Windows Server Virtualization as a viable alternative to the existing VMware ESX Server solution have now to ask themselves:

   1. Why key Xen supporters are offering limited support for it even after implementing the hypervisor on their commercial solutions.

   2. Why Microsoft didn't opt to participate in VMware and Xen hypervisor standardization works instead of working on an interoperability solution.

   3. Why Microsoft needed XenSource to implement Xen interoperability when it knows the project so well.

   4. Given licensing and support issues, why moving a native virtual machine from its hypervisor to another should be better than committing a physical-to-virtual (P2V) migration.

Answering those questions leads to some notable conclusions. First of all, the recently announced Microsoft-XenSource deal has value purely as a political pact. Considering that it's impossible for XenSource to benefit from Microsoft's know-how because of licensing incompatibilities, the agreement is unilateral, providing technical benefits to Microsoft only -- if there are any. The main goal will be to verify if a XenEnterprise Linux virtual machine is as fast as, or faster than, the same machine built from scratch on Windows Server Virtualization. This will be impossible until both companies release their products, assuming hypervisors will feature the interoperability patch at that time.

Another important conclusion is that Xen is a project with high potential but an uncertain destiny. In the immediate future, customers who decide to adopt it even through the Novell or Red Hat operating systems, will live in a half-supported world where they cannot use the hypervisor for anything other than virtualizing the same platform. In this scenario, OS partitioning products like SWsoft Virtuozzo are a better fit.

In the long run, assuming the next-generation processors will be able to provide the same performance paravirtualization offers today, Xen will lose its technical advantage and be obliged to compete au pair with other products. At that point, customers will need a compelling reason to adopt the open source hypervisor, without the experience of VMware or the support capabilities of Microsoft.
#87
Chat Box / Re: QUIZ:"Storage"
Nov 18, 2008, 03:18 PM
QUIZ:Storage Smarts ANSWER KEY

ANSWER KEY: 1d;2c;3c;4a;5b;6b;7a;8d;9c;10b
#88
Chat Box / Re: QUIZ:"Storage"
Nov 18, 2008, 03:16 PM
 Storage management  quiz:ANSWERS

1)d. Hierarchical Storage Management (HSM)
2)c. Internet Small Computer System Interface (iSCSI)
3)a. virtual tape
4)a. failover
5)d. consolidation plan
6)search the answer
7)a. packet writing
8 d. JBOD
9)b. compression
10)c. DLT (digital linear tape)
#89
Chat Box / Re: QUIZ:"Storage"
Nov 18, 2008, 03:09 PM
Storage Management Survival School, quiz ANSWERS

1)c. Information Lifecycle Management. According to Jamie Gruener, assessing the management problem, establishing data quality priorities and developing metrics for measuring ROI are all key parts of the planning roadmap. Information Lifecycle Management deals with the flow of information within a data system, from creation to storage to deletion.

2)a. Business analysis. Gruener suggests examining a few key questions when determining what storage management tools are appropriate for your business. What tools are you using already? What applications are drawing most heavily on your storage resources? What could be automated? And while he doesn't advise you to make your vendor selection based on giveaways, he does suggest you consider which vendor's products are most commonly deployed to address your particular storage need.

3)c. What you need to get you from what you have to what you need. Using criteria such as the forecasted growth of storage, the current draw on the system by particular applications and business considerations such as upcoming mergers and acquisitions, you can determine what the "gap" is between your current storage and your future requirements.

4)d. A combination of all of the above. In order to calculate the net benefits of your system, Gruener recommends that you take TCO, break even analysis and traditional ROI metrics into account.

5)b. Choosing the right product for your specific environment. Storage vendors have aggressively over-marketed their products, and it's getting harder and harder to classify each individual product. Selecting the right product, therefore, should be the culmination of a process of researching vendor offerings, understanding corporate goals and getting a solid feel for the market at large.
6)d. Consolidation

7)A. Excel

8)E. A and B

9)D. All of the above

10)B. A zone that follows the device that is part of the zone
#90
Chat Box / Re: QUIZ:"Storage"
Nov 18, 2008, 02:37 PM
Quiz:Storage networking ANSWERS

1)c. network-attached storage
2)b. provisioning
3)e. Improved word processing
4)a. Network Data Management Protocol (NDMP)
5)c. concurrent access
6)d. zoning
7)a. WAN
8 d. solid-state
9)c. Gigabit Ethernet
10)b. dense wavelength division multiplexing (DWDM)
#91
Chat Box / Re: QUIZ:"Storage"
Nov 18, 2008, 11:16 AM
Storage area networks ANSWERS

1)b. Incorporate all servers into the SAN
2)c. FCIP
3)a. Yes
4)d. ANSI
5)c. Read the labels
6)d. Fibre Channel
7)b. Decreased workload
8 a. Switch-on-a-chip
9)b. Enterprise storage
10)b. Storability
#92
Chat Box / Re: QUIZ:"Storage"
Nov 18, 2008, 11:13 AM
Storage: Do you speak geek?ANSWERS

ANSWER FOR 10

Synchronous Graphics RAM

Synchronous Graphics RAM (SGRAM) is clock-synchronized random access memory that is used for video memory. It is relatively low-cost video memory. It uses masked write , which enables selected data to be modified in a single operation rather as a sequence of read, update, and write operations. It also uses block write , which allows data for background or foreground image fills to be handled more efficiently. SGRAM is single-ported. Its special features are what make it a moderately fast form of video memory. The Matrox Mystique is an example of a video card that uses SGRAM.
#93
Chat Box / Re: QUIZ:"Storage"
Nov 18, 2008, 11:12 AM
Storage: Do you speak geek?ANSWERS

ANSWER FOR 9

Synclink Dynamic RAM

SyncLink SDRAM, along with Direct Rambus DRAM, is a protocol -based approach where all signals to random access memory ( RAM ) are on the same line (rather than having separate column address strobe , row address strobe , address, and data lines). Since access time does not depend on synchronizing operations on multiple lines, SLDRAM promises RAM speed of up to 800 MHz. Like Double Data Rate SDRAM, SLDRAM can operate at twice the system clock rate. SyncLink is an open industry standard that is expected to compete with Direct Rambus DRAM.
#94
Chat Box / Re: QUIZ:"Storage"
Nov 18, 2008, 11:12 AM
Storage: Do you speak geek?ANSWERS

SEARCH THE ANSWER FOR 8
#95
Chat Box / Re: QUIZ:"Storage"
Nov 18, 2008, 11:11 AM
Storage: Do you speak geek?ANSWERS

ANSWER FOR 7

Window RAM

Window RAM (WRAM), unrelated to Microsoft Windows, is very high-performance video RAM that is dual-ported and has about 25% more bandwidth than VRAM but costs less. It has features that make it more efficient to read data for use in block fills and text drawing. It can be used for very high resolution (such as 1600 by 1200 pixels) projection using true color . WRAM is used in the Matrox Millenium video card.
#96
Chat Box / Re: QUIZ:"Storage"
Nov 18, 2008, 11:11 AM
Storage: Do you speak geek?ANSWERS

SEARCH THE ANSWER FOR 6
#97
Chat Box / Re: QUIZ:"Storage"
Nov 18, 2008, 11:10 AM
Storage: Do you speak geek?ANSWERS

ANSWER FOR 5

CD-ROM (Compact Disc, read-only-memory) is an adaptation of the CD that is designed to store computer data in the form of text and graphics, as well as hi-fi stereo sound. The original data format standard was defined by Philips and Sony in the 1983 Yellow Book. Other standards are used in conjunction with it to define directory and file structures, including ISO 9660, HFS (Hierarchal File System, for Macintosh computers), and Hybrid HFS-ISO. Format of the CD-ROM is the same as for audio CDs: a standard CD is 120 mm (4.75 inches) in diameter and 1.2 mm (0.05 inches) thick and is composed of a polycarbonate plastic substrate (underlayer - this is the main body of the disc), one or more thin reflective metal (usually aluminum) layers, and a lacquer coating.

The Yellow Book specifications were so general that there was some fear in the industry that multiple incompatible and proprietary formats would be created. In order to prevent such an occurrence, representatives from industry leaders met at the High Sierra Hotel in Lake Tahoe to collaborate on a common standard. Nicknamed the High Sierra Format, this version was later modified to become ISO 9660. Today, CD-ROMs are standardized and will work in any standard CD-ROM drive. CD-ROM drives can also read audio compact discs for music, although CD players cannot read CD-ROM discs.
#98
Chat Box / Re: QUIZ:"Storage"
Nov 18, 2008, 11:10 AM
Storage: Do you speak geek?ANSWERS

ANSWER FOR 4

parameter RAM

PRAM (parameter RAM or parameter random access memory) is a special battery-powered form of random access memory in certain Macintosh computers where vital system information such as the date and time are stored. PRAM also contains computer configuration information, such as what's connected to each port on the computer. Because PRAM is powered by an internal battery, the information isn't lost when you turn the computer off as it is with regular RAM.

PRAM occasionally gets corrupted as the result of an application failure and needs to be zap ped or restored. The procedure of "zapping the PRAM" is easily located by searching for it on major search engines. However, be aware that it may not apply to more recent Apple computers or operating systems. We suggest contacting Apple to find out the right procedure for your particular system.
#99
Chat Box / Re: QUIZ:"Storage"
Nov 18, 2008, 11:09 AM
Storage: Do you speak geek?ANSWERS

ANSWER FOR 3

EEPROM (electrically erasable programmable read-only memory) is user-modifiable read-only memory (ROM) that can be erased and reprogrammed (written to) repeatedly through the application of higher than normal electrical voltage. Unlike EPROM chips, EEPROMs do not need to be removed from the computer to be modified. However, an EEPROM chip has to be erased and reprogrammed in its entirety, not selectively. It also has a limited life - that is, the number of times it can be reprogrammed is limited to tens or hundreds of thousands of times. In an EEPROM that is frequently reprogrammed while the computer is in use, the life of the EEPROM can be an important design consideration.

A special form of EEPROM is flash memory, which uses normal PC voltages for erasure and reprogramming.
#100
Chat Box / Re: QUIZ:"Storage"
Nov 18, 2008, 11:09 AM
Storage: Do you speak geek?ANSWERS

SEARCH THE ANSWER FOR 2
#101
Chat Box / Re: QUIZ:"Storage"
Nov 18, 2008, 11:08 AM
Storage: Do you speak geek?ANSWERS

ANSWER FOR 1

RAM (random access memory) is the place in a computer where the operating system, application programs, and data in current use are kept so that they can be quickly reached by the computer's processor. RAM is much faster to read from and write to than the other kinds of storage in a computer, the hard disk, floppy disk, and CD-ROM. However, the data in RAM stays there only as long as your computer is running. When you turn the computer off, RAM loses its data. When you turn your computer on again, your operating system and other files are once again loaded into RAM, usually from your hard disk.

RAM can be compared to a person's short-term memory and the hard disk to the long-term memory. The short-term memory focuses on work at hand, but can only keep so many facts in view at one time. If short-term memory fills up, your brain sometimes is able to refresh it from facts stored in long-term memory. A computer also works this way. If RAM fills up, the processor needs to continually go to the hard disk to overlay old data in RAM with new, slowing down the computer's operation. Unlike the hard disk which can become completely full of data so that it won't accept any more, RAM never runs out of memory. It keeps operating, but much more slowly than you may want it to.
#102
Chat Box / Re: QUIZ:"Storage"
Nov 18, 2008, 11:04 AM
RAID technology quiz ANSWERS

ANSWER FOR 10

If your answer was RAID-10, you are correct!

This level of RAID combines RAID levels 0 and 1 and confers benefits in recovery and reliability, albeit at the cost of halving the storage capacity of the RAID array.
#103
Chat Box / Re: QUIZ:"Storage"
Nov 18, 2008, 11:04 AM
RAID technology quiz ANSWERS

SEARCH THE ANSWER FOR 9
#104
Chat Box / Re: QUIZ:"Storage"
Nov 18, 2008, 11:03 AM
RAID technology quiz ANSWERS

ANSWER FOR 8

A mirror is a Web site or set of files on a computer server that has been copied to another computer server so that the site or files are available from more than one place. For files that are popular for downloading, a mirror helps reduce network traffic, ensures better availability of the Web site or files, or enables the site or downloaded files to arrive more quickly for users close to the mirror site. Mirroring is the practice of creating and maintaining mirror sites.

A mirror site is an exact replica of the original site and is usually updated frequently to ensure that it reflects the content of the original site. Mirror sites are used to make access faster when the original site may be geographically distant (for example, a much-used Web site in Germany may arrange to have a mirror site in the United States). In some cases, the original site (for example, on a small university server) may not have a high-speed connection to the Internet and may arrange for a mirror site at a larger site with higher-speed connection and perhaps closer proximity to a large audience.

In addition to mirroring Web sites, you can also mirror files that can be downloaded from an File Transfer Protocol server. Netscape, Microsoft, Sun Microsystems, and other companies have mirror sites from which you can download their browser software.

Mirroring could be considered a static form of content delivery.
#105
Chat Box / Re: QUIZ:"Storage"
Nov 18, 2008, 11:02 AM
RAID technology quiz ANSWERS

ANSWER FOR 7

If your answer was RAID-50, you are correct!

RAID-50: This RAID level is RAID-5 with suspenders. Like the other double-digit RAID levels, RAID-50 is a combination of two basic RAID techniques. It combines striping (RAID-0) with independent data disks with distributed parity (RAID-5). It stripes data across at least two RAID-5 arrays.
#106
Chat Box / Re: QUIZ:"Storage"
Nov 18, 2008, 11:01 AM
RAID technology quiz ANSWERS

ANSWER FOR 6

RAID-5: Striped parity

If your answer was RAID-5, you are correct!

RAID-5: Striped parity. The parity at this level is divided up, with a share being given to each disk in the array. This sharing will balance and reduce the performance impact that is evident in RAID-4 implementations. In software implementations of this array, which are fairly common, performance will often become unacceptably slow if writes make up any more than about 15% of disk activity.
#107
Chat Box / Re: QUIZ:"Storage"
Nov 18, 2008, 11:00 AM
RAID technology quiz ANSWERS

ANSWER FOR 5

IT professionals are constantly trying to prevent the data loss that results from disk failure. Data protection is typically provided through a RAID technology.

RAID gathers individual hard disks into cohesive disk sets (dubbed RAID groups or RAID arrays) that can be operated in unison through a dedicated RAID controller. Most general-purpose servers employ four to eight disks in a RAID group, although storage arrays, such as an EMC Clariion, can gather huge numbers of disks.

Grouping offers three benefits. Drive capacity can be aggregated to create larger storage volume. For example, two 100 GB drives can be aggregated to offer users a single 200 GB volume, although this benefit alone offers no redundancy. Redundancy is accomplished through mirroring where the contents of one disk are directly duplicated (or "mirrored") onto another drive. Should one disk fail, the mirrored disk can step in to supply any needed data.

Unfortunately, mirroring cuts capacity in half, so if you have two 100 GB disks, only one of the disks is usable at a time. Performance benefits are realized through disk striping, where the contents of a file are interleaved across several disks in the RAID group. One disk can be positioning or reading data into cache while another disk is passing data from cache across the drive interface, thereby increasing effective storage performance. In actual practice, RAID usually implements several of these tactics simultaneously.
#108
Chat Box / Re: QUIZ:"Storage"
Nov 18, 2008, 11:00 AM
RAID technology quiz ANSWERS

ANSWER FOR 4

RAID-1: Mirroring

If your answer was RAID-1, you are correct!

RAID-1: Mirroring. All of the data on one disk is copied exactly onto a second disk. Neither disk is the master or primary -- the disks are peers. For writes to be deemed complete, they must make it to both disks. If one disk fails, its partner keeps right on running, without interruption. The good news with this level is that it's very easy to manage and it does not require significant levels of CPU for normal operations or for recovery. The downside to this level is the expense -- for every gigabyte of disk you wish to protect, you need a second, matching gigabyte. In other words, this requires twice as much disk space as unprotected disks.
#109
Chat Box / Re: QUIZ:"Storage"
Nov 18, 2008, 10:59 AM
RAID technology quiz ANSWERS

SEARCH THE ANSWER FOR 3 THIS IS YOUR EXERCISE
#110
Chat Box / Re: QUIZ:"Storage"
Nov 18, 2008, 10:54 AM
RAID technology quiz ANSWERS

SEARCH THE ANSWER FOR 2 THIS IS YOUR EXERCISE
#111
Chat Box / Re: QUIZ:"Storage"
Nov 18, 2008, 10:54 AM
RAID technology quiz ANSWERS

ANSWER FOR 1

RAID-0: Striping

If your answer was RAID-0, you are correct.

RAID-0: Striping. This is the level of RAID that does not live up to its name. Its does not add redundancy. In fact, when run by itself, it reduces the level of protection for the data. When data is striped, it is spread across several disks with each block of data only being written in one place. The advantage here is not in protection but in performance. If any of the disks in the stripe fail, then access to all the disks is lost. However, by spreading the data across more pieces of hardware, writes and reads can be completed more quickly, since the task can be performed by more independent readers and writers.
#112
Chat Box / Re: Find As Many As Possible
Nov 15, 2008, 09:01 PM
METROPOLITAN CITY-KOLKATA
#113
Chat Box / Re: QUIZ:"Storage"
Nov 15, 2008, 08:52 PM
Data storage hardware quiz ANSWERS

ANSWER FOR 10

Optical fiber (or "fiber optic") refers to the medium and the technology associated with the transmission of information as light pulses along a glass or plastic wire or fiber. Optical fiber carries much more information than conventional copper wire and is in general not subject to electromagnetic interference and the need to retransmit signals. Most telephone company long-distance lines are now of optical fiber.

Transmission on optical fiber wire requires repeaters at distance intervals. The glass fiber requires more protection within an outer cable than copper. For these reasons and because the installation of any new wiring is labor-intensive, few communities yet have optical fiber wires or cables from the phone company's branch office to local customers (known as local loops).

A type of fiber known as single mode fiber is used for longer distances; multimode fiber fiber is used for shorter distances.
#114
Chat Box / Re: QUIZ:"Storage"
Nov 15, 2008, 08:52 PM
Data storage hardware quiz ANSWERS

ANSWER FOR 9

Coaxial cable is the kind of copper cable used by cable TV companies between the community antenna and user homes and businesses. Coaxial cable is sometimes used by telephone companies from their central office to the telephone poles near users. It is also widely installed for use in business and corporation Ethernet and other types of local area network.

   
Coaxial cable is called "coaxial" because it includes one physical channel that carries the signal surrounded (after a layer of insulation) by another concentric physical channel, both running along the same axis. The outer channel serves as a ground. Many of these cables or pairs of coaxial tubes can be placed in a single outer sheathing and, with repeaters, can carry information for a great distance.

Coaxial cable was invented in 1929 and first used commercially in 1941. AT&T established its first cross-continental coaxial transmission system in 1940. Depending on the carrier technology used and other factors, twisted pair copper wire and optical fiber are alternatives to coaxial cable.
#115
Chat Box / Re: QUIZ:"Storage"
Nov 15, 2008, 08:51 PM
Data storage hardware quiz ANSWERS

ANSWER FOR 8

A host bus adapter (HBA) is a circuit board and/or integrated circuit adapter that provides input/output (I/O) processing and physical connectivity between a server and a storage device. Because the HBA relieves the host microprocessor of both data storage and retrieval tasks, it can improve the server's performance time. An HBA and its associated disk subsystems are sometimes referred to as a disk channel.
#116
Chat Box / Re: QUIZ:"Storage"
Nov 15, 2008, 08:51 PM
Data storage hardware quiz ANSWERS

ANSWER FOR 7

In a telecommunications network, a switch is a device that channels incoming data from any of multiple input ports to the specific output port that will take the data toward its intended destination. In the traditional circuit-switched telephone network, one or more switches are used to set up a dedicated though temporary connection or circuit for an exchange between two or more parties. On an Ethernet local area network (LAN), a switch determines from the physical device (Media Access Control or MAC) address in each incoming message frame which output port to forward it to and out of. In a wide area packet-switched network such as the Internet, a switch determines from the IP address in each packet which output port to use for the next part of its trip to the intended destination.

In the Open Systems Interconnection (OSI) communications model, a switch performs the layer 2 or Data-Link layer function. That is, it simply looks at each packet or data unit and determines from a physical address (the "MAC address") which device a data unit is intended for and switches it out toward that device. However, in wide area networks such as the Internet, the destination address requires a look-up in a routing table by a device known as a router. Some newer switches also perform routing functions (layer 3 or the Network layer functions in OSI) and are sometimes called IP switches.

On larger networks, the trip from one switch point to another in the network is called a hop. The time a switch takes to figure out where to forward a data unit is called its latency. The price paid for having the flexibility that switches provide in a network is this latency. Switches are found at the backbone and gateway levels of a network where one network connects with another and at the subnetwork level where data is being forwarded close to its destination or origin. The former are often known as core switches and the latter as desktop switches.

In the simplest networks, a switch is not required for messages that are sent and received within the network. For example, a local area network may be organized in a Token Ring or bus arrangement in which each possible destination inspects each message and reads any message with its address.
#117
Chat Box / Re: QUIZ:"Storage"
Nov 15, 2008, 08:51 PM
Data storage hardware quiz ANSWERS

ANSWER FOR 6

Virtual tape is an archival storage technology that makes it possible to save data as if it were being stored on tape although it may actually be stored on hard disk or on another storage medium. Benefits of virtual tape systems include better backup and recovery times and lower operating costs.

A special storage device manages less-frequently needed data so that it appears to be stored entirely on tape cartridges when some parts of it may actually be located in faster, hard disk storage. Virtual tape can be used with a hierarchical storage management (HSM) system in which data is moved as it falls through various usage thresholds to slower but less costly forms of storage media. Virtual tape may also be used as part of a storage area network (SAN) where less-frequently used or archived data can be managed by a single virtual tape server for a number of networked computers.

A virtual tape system offloads from the main computer the processing involved in deciding whether data should be available in the faster disk cache or written onto a tape cartridge. The virtual tape system also can manage data so that more of the space on a tape cartridge is actually used.

IBM and Storage Technology are well-established vendors of virtual tape systems. Sutmyn Storage sells a product that provides a virtual interface to existing IBM and other systems.

The programming for a virtual tape system is sometimes called a virtual tape server (VTS).
#118
Chat Box / Re: QUIZ:"Storage"
Nov 15, 2008, 08:50 PM
Data storage hardware quiz ANSWERS

ANSWER FOR 5

A tape drive is a device that stores computer data on magnetic tape, especially for backup and archiving purposes. Like an ordinary tape recorder, a tape drive records data on a loop of flexible celluloid-like material that can be read and also erased. Tape drives work either by using a traditional helical scan where the recording and playback heads touch the tape, or linear tape technology, where the heads never actually touch the tape. Drives can be rewinding, where the device issues a rewind command at the end of a session, or non-rewinding. Rewinding devices are most commonly used when a tape is to be unmounted at the end of a session after batch processing of large amounts of data (payroll is the classic example). Non-rewinding devices are useful for incremental backups and other applications where new files are added to the end of the previous session's files.

A benefit of a tape drive backup is that tapes have a large capacity for storing data and are very economical when compared to the cost of hard disk storage. A disadvantage is that tape drives store data sequentially, and the user can only access specific data by starting at the beginning and rolling through the tape until the desired data is located.
#119
Chat Box / Re: QUIZ:"Storage"
Nov 15, 2008, 08:50 PM
Data storage hardware quiz ANSWERS

ANSWER FOR 4

1) In data storage, an array is a method for storing information on multiple devices. 2) In general, an array is a number of items arranged in some specified way - for example, in a list or in a three-dimensional table.

3) In computer programming languages, an array is a group of objects with the same attributes that can be addressed individually, using such techniques as subscripting.

4) In random access memory (RAM), an array is the arrangement of memory cells.
#120
Chat Box / Re: QUIZ:"Storage"
Nov 15, 2008, 08:50 PM
Data storage hardware quiz ANSWERS

ANSWER FOR 3

Fibre Channel is a technology for transmitting data between computer devices at data rates of up to 4 Gbps (and 10 Gbps in the near future). Fibre Channel is especially suited for connecting computer servers to shared storage devices and for interconnecting storage controllers and drives. Since Fibre Channel is three times as fast, it has begun to replace the Small Computer System Interface (SCSI) as the transmission interface between servers and clustered storage devices. Fibre channel is more flexible; devices can be as far as ten kilometers (about six miles) apart if optical fiber is used as the physical medium. Optical fiber is not required for shorter distances, however, because Fibre Channel also works using coaxial cable and ordinary telephone twisted pair.

Fibre Channel offers point-to-point, switched, and loop interfaces. It is designed to interoperate with SCSI, the Internet Protocol (IP) and other protocols, but has been criticized for its lack of compatibility - primarily because (like in the early days of SCSI technology) manufacturers sometimes interpret specifications differently and vary their implementations.

Standards for Fibre Channel are specified by the Fibre Channel Physical and Signalling standard, and the ANSI X3.230-1994, which is also ISO 14165-1.
#121
Chat Box / Re: QUIZ:"Storage"
Nov 15, 2008, 08:49 PM
Data storage hardware quiz ANSWERS

ANSWER FOR 2

Serial-attached SCSI (SAS) is a method used in accessing computer peripheral devices that employs a serial (one bit at a time) means of digital data transfer over thin cables. The method is specified in the American National Standard Institute standard called Serial-attached SCSI (Small Computer System Interface), also known as ANSI/INCITS 376-2003. In the business enterprise, serial-attached SCSI is especially of interest for access to mass storage devices, particularly external hard drives.

Serial-attached SCSI offers advantages over older parallel technologies. The cables are thinner, and the connectors are less bulky. Serial data transfer allows the use of longer cables than parallel data transfer. Problems related to crosstalk are less likely in serial interfaces than in parallel interfaces, because there are fewer conductors in the cables. The hardware for serial interfaces is less costly than the hardware for equivalent parallel interfaces.

SAS offers data transfer rates in excess of 3 gigabits per second (Gbps) with potential rates of 10 Gbps or more. Serial-attached SCSI is said to offer an ideal solution for businesses with substantial storage, backup, and archiving demands.

Devices that employ SAS are compatible with Serial ATA (Advanced Technology Attachment) devices. In addition, SAS products are compatible with devices that employ earlier SCSI technologies. External disk drives, host adapters, and expanders were the first devices to employ SAS. The technology is expected to expand to printers, scanners, digital cameras, and other peripherals.
#122
Chat Box / Re: QUIZ:"Storage"
Nov 15, 2008, 08:48 PM
Data storage hardware quiz ANSWERS

ANSWER FOR 1

Serial ATA (Serial Advanced Technology Attachment or SATA) is a new standard for connecting hard drives into computer systems. As its name implies, SATA is based on serial signaling technology, unlike current IDE (Integrated Drive Electronics) hard drives that use parallel signaling.

SATA has several practical advantages over the parallel signaling (also called Parallel ATA or PATA) that has been used in hard drives since the 1980s. SATA cables are more flexible, thinner, and less massive than the ribbon cables required for conventional PATA hard drives. SATA cables can be considerably longer than PATA ribbon cables, allowing the designer more latitude in the physical layout of a system. Because there are fewer conductors (only 7 in SATA as compared with 40 in PATA), crosstalk and electromagnetic interference (EMI) are less likely to be troublesome. The signal voltage is much lower as well (250 mV for SATA as compared with 5 V for PATA).
#123
Chat Box / Re: QUIZ:"Storage"
Nov 15, 2008, 08:47 PM
Quiz: Data Storage ANSWERS

ANSWER KEY:1c;2e;3b;4c;5c;6b;7e;8b;9a;10e
#124
Chat Box / Re: QUIZ:"Storage"
Nov 15, 2008, 08:21 PM
Quiz: Database Basics ANSWERS

ANSWER KEY:1a;2b;3b;4b;5e;6d;7b;8a;9a;10c
#125
Chat Box / Re: QUIZ:"Storage"
Nov 15, 2008, 06:07 PM
Data storage technologies quiz ANSWERS

ANSWER FOR 10

Tiered storage is the assignment of different categories of data to different types of storage media in order to reduce total storage cost. Categories may be based on levels of protection needed, performance requirements, frequency of use, and other considerations. Since assigning data to particular media may be an ongoing and complex activity, some vendors provide software for automatically managing the process based on a company-defined policy.

As an example of tiered storage, tier 1 data (such as mission-critical, recently accessed, or top secret files) might be stored on expensive and high-quality media such as double-parity RAIDs (redundant arrays of independent disks). Tier 2 data (such as financial, seldom-used, or classified files) might be stored on less expensive media in conventional storage area networks (SANs). As the tier number increased, cheaper media could be used. Thus, tier 3 in a 3-tier system might contain event-driven, rarely used, or unclassified files on recordable compact discs (CD-Rs) or tapes.
#126
Chat Box / Re: QUIZ:"Storage"
Nov 15, 2008, 06:07 PM
Data storage technologies quiz ANSWERS

ANSWER FOR 8

Continuous data protection (CDP), also called continuous backup, is a storage system in which all the data in an enterprise is backed up whenever any change is made. In effect, CDP creates an electronic journal of complete storage snapshots, one storage snapshot for every instant in time that data modification occurs.

A major advantage of CDP is the fact that it preserves a record of every transaction that takes place in the enterprise. In addition, if the system becomes infected with a virus or Trojan, or if a file becomes mutilated or corrupted and the problem is not discovered until some time later, it is always possible to recover the most recent clean copy of the affected file. A CDP system with disk storage offers data recovery in a matter of seconds -- much less time than is the case with tape backups or archives. Installation of CDP hardware and programming is straightforward and simple and does not put existing data at risk.

The market for CDP products is expected to grow as businesses discover the advantages of maintaining a continuous journal of backups or archives generated over time. This is especially true for enterprises in which data changes often, the amount of stored data is large, or serious injury to the business could result from lost data, damaged files, or extended downtime.
#127
Chat Box / Re: QUIZ:"Storage"
Nov 15, 2008, 06:07 PM
Data storage technologies quiz ANSWERS

ANSWER FOR 7

Content-addressed storage (CAS) is a method of providing fast access to fixed content (data that is not expected to be updated) by assigning it a permanent place on disk. CAS makes data retrieval straightforward by storing it in such a way that an object cannot be duplicated or modified once it has been stored; thus, its location is unambiguous. The term was coined by EMC Corporation when it released its Centera product in 2002.

When an object is stored in CAS, the object is given a name that uniquely identifies it, and that also specifies the storage location. This type of address is called a "content address." It eliminates the need for an centralized index, so it is not necessary to track the location of stored data. Once an object has been stored, it cannot be deleted until the specified retention period has expired. In CAS, data is stored on disk, rather than on tape. This streamlines the process of searching for stored objects. A backup copy of every object is stored to enhance reliability and to minimize the risk of catastrophic data loss. In the event of a hardware failure, the system administrator is notified by a remote monitoring system.

A significant advantage of CAS is the fact that it minimizes the storage space consumed by data backups and archives, preventing what some engineers call a "data tsunami" (the overwhelming buildup of information, much of which is obsolete, redundant, or unnecessary). Another advantage is authentication. Because there is only one copy of an object, verifying its legitimacy is a simple process.
#128
Chat Box / Re: QUIZ:"Storage"
Nov 15, 2008, 06:06 PM
Data storage technologies quiz ANSWERS

ANSWER FOR 6

Wide-area file services (WAFS) is a storage technology that makes it possible to access a remote data center as though it were local. Among other benefits, WAFS enables businesses, academic institutions, and government agencies having numerous branch offices to centrally manage data backups in real time.

Other benefits of WAFS include immediate, round-the-clock read-write access to backed-up data for all end users in the network, low latency and rapid data transfer speed comparable to local area network (LAN) technologies, continuous real-time updating of backup content, enhanced data security, and simple, rapid system recovery in the event the network is compromised or damaged. Additional security of data may be possible by backing up the data on multiple servers at different physical locations.
#129
Chat Box / Re: QUIZ:"Storage"
Nov 15, 2008, 06:06 PM
Data storage technologies quiz ANSWERS

ANSWER FOR 5

InfiniBand is an architecture and specification for data flow between processors and I/O devices that promises greater bandwidth and almost unlimited expandability in tomorrow's computer systems. In the next few years, InfiniBand is expected to gradually replace the existing Peripheral Component Interconnect (PCI) shared-bus approach used in most of today's personal computers and servers. Offering throughput of up to 2.5 gigabytes per second and support for up to 64,000 addressable devices, the architecture also promises increased reliability, better sharing of data between clustered processors, and built-in security. InfiniBand is the result of merging two competing designs, Future I/O, developed by Compaq, IBM, and Hewlett-Packard, with Next Generation I/O, developed by Intel, Microsoft, and Sun Microsystems. For a short time before the group came up with a new name, InfiniBand was called System I/O.

Existing PCs and server systems are hampered with an inflexible and relatively slow internal data flow system, including today's 64-bit, 66 MHz PCI bus. As the amount of data coming into and flowing between components in the computer increases, the existing bus system becomes a bottleneck. InfiniBand provides a revolutionary new approach. Instead of sending data in parallel (typically 32 bits at a time, but in some computers 64 bits) across the backplane bus (data path), InfiniBand specifies a serial (bit-at-a-time) bus. Fewer PINs and other electrical connections are required, saving manufacturing cost and improving reliability. The serial bus can carry multiple channels of data at the same time in a multiplexing signal. InfiniBand also supports multiple memory areas, each of which can addressed by both processors and storage devices.

Unlike the present I/O subsystem in a computer, InfiniBand seems like a full-fledged network. The InfiniBand Trade Organization describes the new bus as an I/O network and views the bus itself as a switch since control information will determine the route a given message follows in getting to its destination address. In fact, InfiniBand uses Internet Protocol Version 6 (IPv6) with its 128-bit address, allowing an almost limitless amount of device expansion.

With InfiniBand, data is transmitted in packets that together form a communication called a message. A message can be a remote direct memory access (RDMA) read or write operation, a channel send or receive message, a transaction-based operation (that can be reversed), or a multicast transmission. Like the channel model many mainframe users are familiar with, all transmission begins or ends with a channel adapter. Each processor (your PC or a data center server, for example) has what is called a host channel adapter (HCA) and each peripheral device has a target channel adapter (TCA). These adapters can potentially exchange information that ensures security or work with a given Quality of Servic
#130
Chat Box / Re: QUIZ:"Storage"
Nov 15, 2008, 06:05 PM
Data storage technologies quiz ANSWERS

ANSWER FOR 4

IP storage is a general term for several approaches to using the Internet Prototol (IP) in a storage area network (SAN) usually over Gigabit Ethernet. IP storage is an alternative to the Fibre Channel framework of the traditional SAN. Proponents of IP-based storage claim that it offers a number of benefits over the Fibre Channel alternative, and will promote the wide-spread adoption of SANs that was predicted when they were first introduced. Although SANs have been around since the mid-to-late 1990s, they haven't enjoyed the market acceptance that developers expected. Fibre Channel issues, including expense, complexity, and interoperability issues are frequently cited as the cause. According to proponents, IP storage provides a solution to these issues that will enable the SAN to fulfill its early promise.

For example, taking advantage of common network hardware and technologies may make IP SANs less complicated to deploy than Fibre Channel. The hardware components are less expensive, and because the technologies are widely known and used there are few interoperability issues and training costs are lower. Furthermore, the ubiquity of TCP/IP networks makes it possible to extend or connect SANs worldwide. There are several technology alternatives currently used for IP SANs: iSCSI (Internet SCSI) replaces Fibre Channel, while alternatives such as iFCP (Internet Fibre Channel Protocol) and FCIP (Fibre Channel over IP) offer hybrid approaches that can be used to extend Fibre Channel frameworks and to migrate from them to an IP storage network.
#131
Chat Box / Re: QUIZ:"Storage"
Nov 15, 2008, 06:05 PM
Data storage technologies quiz ANSWERS

ANSWER FOR 3

Tape and disk encryption product roundup

More than 50 million Americans have had their personal information compromised in the last year, and many of those security breaches have been the result of tape loss. With so much data at risk -- and the potential penalties involved -- storage administrators are struggling to protect sensitive information at rest in the data center and in flight across public networks. Vendors also see the problem, and are stepping forward with software and appliances that can ease implementation. The trick is to sort through the proliferation of offerings and find a product that meets your business requirements without breaking the budget. This article provides an overview of encryption and its role in the enterprise, highlights the leading vendors who offer disk and tape encryption products, and offers some advice to help ease purchasing and implementation issues.
#132
Chat Box / Re: QUIZ:"Storage"
Nov 15, 2008, 06:05 PM
Data storage technologies quiz ANSWERS

ANSWER FOR 2

Virtualization is the pooling of physical storage from multiple network storage devices into what appears to be a single storage device that is managed from a central console. Storage virtualization is commonly used in a storage area network (SAN). The management of storage devices can be tedious and time-consuming. Storage virtualization helps the storage administrator perform the tasks of backup, archiving, and recovery more easily, and in less time, by disguising the actual complexity of the SAN.

Users can implement virtualization with software applications or by using hardware and software hybrid appliances. The technology can be placed on different levels of a storage area network.
#133
Chat Box / Re: QUIZ:"Storage"
Nov 15, 2008, 06:03 PM
Data storage technologies quiz ANSWERS

ANSWER FOR 1

Thin provisioning, coined by 3Pardata, raises eyebrows


Storage managers in the market for a new SAN array may be tempted by a new feature of some arrays -- thin provisioning (TP) pioneered by 3PARdata Inc. -- but not all users who have tried it are sold on the concept.

Thin provisioning, sometimes called oversubscription, is a way to quickly get capacity to an application. It's a feature of some virtualized storage arrays where the storage controller allocates storage to the application but releases it only when the capacity is required. When utilization of that storage approaches a predetermined threshold, the array automatically expands the volume without involving the storage administrator.

Related articles

EMC, HDS kick off thin provisioning cage match

An introduction to thin provisioning

Save time and money with thin provisioning 

Over-provisioning a thing of the past 
   
Thin provisioning helps storage administrators break the old habit of overprovisioning storage -- a common practice used to protect against having to continually grow volumes and LUNs. Vendors with thin provisioning include 3Par as well as Cloverleaf Communications Inc., DataCore Software Corp., LeftHand Networks Inc., Network Appliance Inc. and Pillar Data Systems Inc..

Some users love thin provisioning. Warren Habib, chief technology officer at Fotolog Inc., an online photo blog site in New York City, has seen his storage administration duties dwindle to next to nothing since his firm rearchitected its infrastructure and added a 3Par InServ array. Before putting in the InServ array, Fotolog's file serving was handled by 120 standalone file servers with internal storage, and "keeping up with storage growth was impossible," Habib said. Now, whenever Fotolog's InServ sees the file server volumes running out of space, it automatically grows them by 32 GB. "I didn't have to check on the system capacity for three months," he said.

But other users haven't had such idyllic experiences. Nick Poolos, systems/network specialist at The Ohio State University's Fisher College of Business, saw the NTFS file systems mounted on a Compellent Storage Center SAN grow abnormally large when using the array's Dynamic Capacity feature.

At issue, according to Bob Fine, Compellent's product marketing manager, is Microsoft's "undelete" feature, which just marks blocks to be released without actually erasing them. Rather than reusing released blocks, NTFS prefers new, unused blocks, which caused the thin-provisioned volume to swell to its maximum allocated size. Fine says doing a periodic disk defragmentation may be a workaround. He adds that most users will never witness this problem because most environments grow gradually and don't delete much data.

Arun Taneja, founder, president and consulting analyst at the Taneja Group, Hopkinton, Mass., warns of another possible thin-provisioning pitfall: Some file systems, for performance reasons, like to spread their metadata across all the space they have been assigned.

"In many cases, if you allocate 100 GB to the application, the application (or the file system associated with it) will mark all the entire 100 GB with metadata," Taneja writes. "If the application behaves in this fashion, realize that 100 GB is gone from the storage pool and is no longer available. This defeats the entire purpose of TP in the first place."

Those reasons likely contributed to thin provisioning's rank at the bottom of TheInfoPro's recent Wave 7 index of hot technologies, reports Rob Stevenson, managing director, storage practice at TheInfoPro. As a former storage administrator, Stevenson's personal experience taught him that "thin provisioning was application sensitive and introduced another pain into the infrastructure certification process." He found that "each file system, relational database and NAS appliance allocated storage differently, and it typically confused the thin-provisioning product."

Some storage vendors think thin provisioning is a downright bad idea. "If your goal with a SAN is ease of use and consolidation, you shouldn't be telling administrators to lie and then have to manage the lie," said Eric Schott, director of product management at IP SAN vendor EqualLogic Inc. If, from a host perspective, it looks like there's a lot of available space, a user might decide to use it. And if the array can't provision new storage fast enough, the application will crash.

Furthermore, Schott said, the underlying reason for thin provisioning -- that it's a pain to grow storage volumes -- isn't true anymore. Expanding a disk is a relatively simple process with most modern operating systems, he said. However, he concedes that thin provisioning could be useful if you're running some legacy operating systems.

Nevertheless, SAN vendors offering thin provisioning report that their users have embraced it. Compellent's Fine says that approximately 80% of Storage Center users have Dynamic Capacity in place. The remaining 20%, he says, aren't using it because "old habits die hard," not because there's anything wrong with it.
#134
Chat Box / Re: Interesting game
Nov 15, 2008, 02:57 PM
hay
-feed/food
#135
Chat Box / Re: quiz:"Virtualization"
Nov 15, 2008, 02:53 PM
Quiz: Virtual virtuosity

1. Traditionally, you take a bow after this. The word also refers to the speed at which your PC operates. What is it?
Answer

2. This term sounds like something that could start a fire. In computing, however, it refers to a 32- and 64-bit microprocessor architecture from Sun Microsystems based on reduced instruction set computing. What is it?
Answer

3. Mountain or molehill? This term describes the ability of a computer application or product to continue to function well when it is changed in size or volume in order to meet a user need. What is it?
Answer

4. This generic name describes the series of Intel microprocessors that began with the 80286. What is it?
Answer

5. Apple, IBM, and Motorola collaborated on an open standard for this microprocessor architecture. What is it?
Answer

6. The Search for Extraterrestrial Intelligence project is only one example of this computing model, which applies the resources of many networked computers to a single problem. What is it?
Answer

7. This program emulates Windows 95, Windows 98, Windows NT, as well as IBM OS/2, or Linux on a Macintosh personal computer. What is it?
Answer

8. This practice can help an administrator perform the tasks of backup, archiving, and recovery more easily, and in less time, by disguising the actual complexity of the SAN. What is it?
Answer

9. This virtualization program allows multiple operating systems, which can include different operating systems or multiple instances of the same operating system, to share a single hardware processor. What is it?
Answer

10. This practice relieves data center pressure by masking the details of server resources from users while optimizing resource sharing. What is it?
Answer
#136
Chat Box / Re: quiz:"Virtualization"
Nov 15, 2008, 02:50 PM
Virtual LAN quiz

1. This is the unit of data that is routed between an origin and a destination on the Internet or any other packet-switched network.

2. This is a way to use a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network.

3. ms stands for this.

4. On a local area network (LAN) or other network, this is your computer's unique hardware number.

5. This device channels incoming data from any of multiple input ports to the specific output port that will take the data toward its intended destination.

6. This is the abbreviation for millions of bits per second.

7. The unit of data that is routed between an origin and a destination on the Internet or any other packet-switched network is known as this.

8. This organization fosters the development of standards that often become national and international standards.

9. A device or, in some cases, software in a computer, that determines the next network point to which a packet should be forwarded toward its destination is known as this.

10. This is a geographically dispersed telecommunications network.
#137
Chat Box / quiz:"Virtualization"
Nov 15, 2008, 02:49 PM
Newsmaker quiz

1. This company reported that Microsoft's upcoming Windows Server Virtualization and Xen hypervisors have a similar architecture. What company was it?
Answer

2. Don Becker, co-founder of the Beowulf project, recently compared virtualization to an alternative approach to the same problems. What is it?
Answer

3. A recent study by TheInfoPro(TIP) Inc. demonstrated that this type of hardware is gaining respect among IT professionals alongside virtualization in the data center. What was it?
Answer

4. This major virtualization player is slated to release a product for Mac users. What is it?
Answer

5. International Truck and Engine Corp. based in Illinois saved several million dollars by virtualizing their servers. How much did they save for each virtual machine running?
a. $3,500
b. $5,500
c. $7,500
Answer

6. Who is the director of data products for VMware?
Answer

7. The Computing Technology Industry Association recently polled 1,000 high tech workers. What percentage of survey respondents said they were currently job-hunting?
a. 28%
b. 58%
c. 78%
Answer

8. This Ohio-based independent IT consultant and subcontractor recently started promoting virtualization as a disaster recovery tool. What is it?
Answer

9. In one of our columns, expert Andrew Kutz explains how to install Subversion for VMware ESX. How many steps does it take?
Answer

10. This virtualization program is the best for a heterogeneous environment according to author Wade Reynolds. What is it?
Answer
#138
Chat Box / Re: QUIZ:"Storage"
Nov 15, 2008, 02:46 PM
Top 25 data storage terms quiz

1. This is hard disk storage that is set up with its own network address rather than being attached to the department computer that is serving applications to a network's workstation users.
What is it?

2. This is a new standard for connecting hard drives into computer systems. It is based on serial signaling technology, unlike current IDE hard drives that use parallel signaling.
What is it?

3. This technology offers point-to-point, switched and loop interfaces. It is designed to interoperate with SCSI, IP and other protocols.
What is it?

4. This is an IP-based storage networking standard for linking data storage facilities, developed by the Internet Engineering Task Force.
What is it?

5. This is a unique identifier used on a SCSI bus that enables it to differentiate between up to eight separate devices.
What is it?

6. This is a way of storing the same data in different places on multiple hard disks. By placing data on multiple disks, I/O operations can overlap in a balanced way, improving performance.
What is it?

7. This is a high-speed special-purpose network (or subnetwork) that interconnects different kinds of data storage devices with associated data servers on behalf of a larger network of users.
What is it?

8. This is a method used in accessing computer peripheral devices that employs a serial means of digital data transfer over thin cables.
What is it?

9. This is a method of reducing storage needs by eliminating redundant data.
What is it?

10. This is the pooling of physical storage from multiple network storage devices into what appears to be a single storage device that is managed from a central console.
What is it?

11. This is the assignment of different categories of data to different types of storage media in order to reduce total storage cost. Categories may be based on levels of protection needed, performance requirements, frequency of use and other considerations.
What is it?

12. This is a storage system in which all the data in an enterprise is backed up whenever any change is made.
What is it?

13. This is the activity of copying files or databases so that they will be preserved in case of equipment failure or other catastrophe.
What is it?

14. This technology focuses on file-level activities rather than block-level activities.
What is it?

15. This technology provides the benefits of disk storage in a system that emulates a tape library to existing backup software.
What is it?

16. This is a single storage system that can support both file access and block access.
What is it?

17. This is a feature of storage security that is gaining favor among enterprises that use storage area networks (SANs).
What is it?

18. Without this practice, backing up data is virtually useless.
What is it?

19. This ensures proper adherence to government regulations regarding the integrity, accessibility and retention of important data.
What is it?

20. There are endless rules and regulations in this area of storage technology.
What is it?

21. This is a repository for the storage, management, and disemination of data in which the mechanical, lighting, electrical and computer systems are designed for maximum energy efficiency and minimum environmental impact.
What is it?

22. This is the process of assigning storage, usually in the form of server disk drive space, in order to optimize the performance of a storage area network.
What is it?

23. Simply stated, these are large boxes that hold lots of hard disks.
What is it?

24. This consists of the precautions taken so that the effects of a disaster will be minimized.
What is it?

25. This is the practice of collecting computer files that have been packaged together for backup, to transport to some other location, for saving away from the computer so that more hard disks can be made available, or for some other purpose.
What is it?
#139
Chat Box / Re: QUIZ:"Storage"
Nov 15, 2008, 02:45 PM
Business continuity plan quiz

1. What should be the first step in business continuity planning?
Answer

2. This type of plan specifies an organization's planned strategies for post-failure procedures.
Answer

3. This type of plan specifies a means of maintaining essential services at the crisis location.
Answer

4. This particular plan specifies a means of recovering business functions at an alternate location.
Answer

5. This type of plan specifies a means of dealing with external events that can seriously impact the organization.
Answer

6. What type of technology makes it feasible for an organization to maintain up-to-date copies of data in geographically dispersed locations so that data access can continue uninterrupted if one location is disabled?
Answer

How did you score?
6 correct: You're BC brilliant
3-5 correct: You've got BC bravado
0-2 correct: You're a BC beginner
#140
Chat Box / Re: QUIZ:"Storage"
Nov 15, 2008, 02:44 PM
Quiz: Storage Smarts

l. This is a general term for all forms of solid state memory that have a continuous source of power and do not need to have their memory contents periodically refreshed.
a. flash memory
b. random access memory
c. volatile memory
d. nonvolatile memory

2. This type of data storage uses laser beams to store computer-generated data in three dimensions. The goal is to store a lot of data in a little bit of space.
a. digital data storage
b. virtual memory
c. holographic storage
d. optical disk storage

3. This is a set of evolving ANSI standard electronic interfaces that allow personal computers to communicate with peripheral hardware such as disk drives, tape drives, CD-ROM drives, printers, and scanners faster and more flexibly than previous interfaces.
a. ESCON
b. Fibre Channel
c. SCSI
d. ASCII

4. This is the process of dividing a body of data into blocks and spreading the data blocks across several partitions on several hard disks.
a. disk striping
b. RAID
c. logical partition ing
d. multiplexing

5. This amount of data is the equivalent of more than 300 feature-length movies, 40,000 faxes, 15,000 CDs converted to MP3 at high fidelity, or enough words that it would take every adult in America speaking at the same time for five minutes to say them all.
a. petabyte
b. terabyte
c. exabyte
d. megabyte

6. This is the practice of duplicating data in which each of multiple storage disks has its own SCSI controller. The use of redundant controllers enables continued data access as long as one of the controllers continues to function.
a. disk mirroring
b. disk duplexing
c. data replication
d. content caching

7. This is a compact disc (CD) format that allows repeated recording on a disc. It was introduced by Hewlett-Packard, Mitsubishi, Philips, Ricoh and Sony in a 1997 supplement to Philips and Sony's Orange Book. It is Orange Book III.
a. CD-RW
b. CD-MO
c. CD-R
d. CD-i

8. This type of storage media holds content in digital form that is written and read by a laser; these media include all the various CD and DVD variations, as well as optical jukeboxes and autochangers.
a. streaming media
b. magneto-optical drive media
c. real life media
d. optical media

9. This is the combination of hardware and software that moves data coming in to a network node out by the correct port (door) to the next node in the network.
a. router
b. gateway
c. switching fabric
d. bus

10. This is a standard unit of measure for designating the height in computer enclosures and rack cabinets. It equals 1.75 inches.
a. GB
b. U
c. kludge
d. n-tier
#141
Chat Box / Re: QUIZ:"Storage"
Nov 15, 2008, 02:43 PM
Quiz #2: Storage management

Question #11

This is policy-based management of file backup and archiving in a way that uses storage devices economically and without the user needing to be aware of when files are being retrieved from backup storage media.

a. ADSTAR Distributed Storage Management
b. content management system
c. spend management
d. Hierarchical Storage Management
e. Environmental Resources Management

Click to see if you are correct.

Question #12

This storage networking technology developed by the Internet Engineering Task Force (IETF) carries SCSI commands over IP networks to facilitate data transfers over intranets and to manage storage over long distances.

a. Fibre Channel over IP
b. Voice over IP
c. Internet Small Computer System Interface
d. Transmission Control Protocol/Internet Protocol
e. beaming

Click to see if you are correct.

Question #13

This is the use of a special storage device that manages less-frequently needed data so that it appears to be stored entirely on tape cartridges when some parts of it may actually be located in faster, hard disk storage.

a. virtual tape
b. linear tape
c. hard disk
d. bridge disk
e. 8-track tape

Click to see if you are correct.

Question #14

This is a backup operational mode in which the functions of a system component (such as a processor, server, network, or database, for example) are assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time.

a. failover
b. Internet backup
c. local backup
d. data availability
e. standby

Click to see if you are correct.

Question #15

According to a Gartner Group document, a business continuance plan should include all but one of the following strategies. Which one is NOT included?

a. business resumption plan
b. business recovery plan
c. disaster recovery plan
d. consolidation plan
e. contingency plan

Click to see if you are correct.

Question #16

There are at least nine types of RAID plus a non-redundant array. Which type uses striping, dedicates one drive to storing parity information, and is best for single-user systems with long record applications?

a. RAID-O
b. RAID-1
c. RAID-3
d. RAID-7
e. RAID-101

Click to see if you are correct.

Question #17

This is a technology that enables the writing of data to a recordable compact disk incrementally, in multiple small blocks of data, rather than in a single block, or in blocks defined by tracks, the other two common methods.

a. packet writing
b. disk-at-once recording
c. track-at-once recording
d. write once, read many
e. audio grabbing

Click to see if you are correct.

Question #18

This term is used to refer to a computer's hard disks that haven't been configured according to the RAID system to increase fault tolerance and improve data access performance. The official term is "spanning."

a. disk cache
b. stripe
c. array
d. JBOD
e. menagerie

Click to see if you are correct.

Question #19

Ths is the reduction in size of data in order to save space or transmission time.

a. clustering
b. compression
c. consolidation
d. phase change
e. minifying

Click to see if you are correct.

Question #20

This is a form of magnetic tape and drive system used for computer data storage and archiving. A special compression algorithm, known as Digital Lempel Ziv 1 (DLZ1), facilitates storage and retrieval of data at high speeds and in large quantities.

a. AIT (advanced intelligent tape)
b. LTO (linear tape open)
c. DLT (digital linear tape)
d. Mammoth
e. Betamax

Click to see if you are correct.
#142
Chat Box / Re: QUIZ:"Storage"
Nov 15, 2008, 02:42 PM
Storage Management Survival School, Quiz one

Question #1

Which is NOT part of Jamie Gruener's planning roadmap?

a. Adding more components to your network
b. Quality of service (QoS)
c. Information Lifecycle Management
d. Modeling costs

Click to see if you are correct!

Question #2

According to Jamie Gruener, which is the first consideration you need to make when selecting a storage management tool?

a. Business analysis
b. Cost
c. Functionality
d. The vendor who offers the best gift

Click to see if you are correct!

Question #3

What is "Gap Analysis"?

a. The difference between capacity and disk space
b. The difference between virtualized data and actual data
c. What you need to get you from what you have to what you need
d. The difference between the Gap and J. Crew

Click to see if you are correct!

Question #4

Which financial analysis metric is the best for a cost analysis?
a. TCO
b. ROI
c. Break even analysis
d. A combination of all of the above

Click to see if you are correct!

Question #5

According to Jamie Gruener, what's the hardest part of storage management planning?

a. Convincing upper management to buy-in
b. Choosing the right product for your specific environment
c. Predicting growth
d. Implementing a plan

Click to see if you are correct!

Question #6

Which is NOT a best practice for optimal allocation?

a. Utilizing RAID 1, 1+0
b. Using RAID-5
c. Balancing I/O
d. Consolidation

Click to see if you are correct!

Question #7

What is the most popular tool for tracking allocation and configuration?

a. Excel
b. Word
c. Log file system
d. Basset hound

Click to see if you are correct!

Question #8

Which are the primary component(s) to the LUN mapping and masking process?

a. Enabling multiple server to see LUN numbers
b. Restricting server access
c. Only A
d. Only B
e. A and B

Click to see if you are correct!

Question #9

Which is critical when selecting a storage management tool?

a. Making sure the tool supports multiple levels of user security and privileges
b. Understanding tool licensing and what type of warranty exists
c. Knowing which architecture of the tool including platforms supported
d. All of the above

Click to see if you are correct!

Question #10

What is a soft zone?

a. A zone with no shell
b. A zone that follows the device that is part of the zone
c. A zone Where each server/HBA is in a separate zone
d. A zone that gives up a lot of touchdowns

Click to see if you are correct!
#143
Chat Box / Re: QUIZ:"Storage"
Nov 15, 2008, 02:41 PM
Quiz #3: Storage networking

Question #21

This is hard disk storage that is set up with its own network address rather than being attached to the department computer that is serving applications to a network's workstation users.

a. storage area network
b. hard disk drive
c. network-attached storage
d. redundant array of independent disks
e. file cabinet

Click to see if you are correct.

Question #22

Storage networking expert Marc Farley defines this term as the process of securing end-to-end connections for a network. In telecommunications terminology, it means finding network links from whatever assortment of service providers there are to build the necessary point-to-point connections.

a. wiring
b. provisioning
c. routing
d. mapping
e. circling

Click to see if you are correct.

Question #23

SAN expert Christopher Poelker shared an extensive list of principal benefits of moving to a SAN. Which of the following is NOT one of them?

a. Protect critical data
b. Staff utilization for server management
c. Management costs as a percentage of storage costs
d. Reduce data center rack/floor space
e. Improved word processing

Click to see if you are correct.

Question #24

This is an open protocol used to control data backup and recovery communications between primary and secondary storage in a heterogeneous network environment.

a. Network Data Management Protocol (NDMP)
b. Common Management Information Protocol (CMIP)
c. Transmission Control Protocol/Internet Protocol (TCP/IP)
d. Point-to-Point Protocol (PPP)
e. Bootstrap Protocol (BOOTP)

Click to see if you are correct.

Question #25

This is the ability to access a particular LUN from either two different paths on a single host simultaneously (load balanced), or by two separate hosts within a cluster environment (distributed lock management).

a. remote access
b. direct access
c. concurrent access
d. conditional access
e. access denied

Click to see if you are correct.

Question #26

This is a fundamental technique for SAN management that can be implemented several different ways. In all cases, it serves to limit users' access to the appropriate storage devices. This increases security and decreases traffic over the network.

a. striping
b. mapping
c. tunneling
d. zoning
e. locking

Click to see if you are correct.

Question #27

This is a geographically dispersed telecommunications network. It may be privately owned or rented, but the term usually connotes the inclusion of public (shared user) networks.

a. wide area network (WAN)
b. local area network (LAN)
c. metropolitan area network (MAN)
d. storage area network (SAN)
e. personal area network (PAN)

Click to see if you are correct.

Question #28

There are six S's to SAN (storage area network), says Scott Drummond, IBM's storage networking program director. Which of the following is not one of them?

a. servers
b. software
c. storage
d. solid-state
e. SAN fabric

Click below to see if you are correct.

Question #29

This is a transmission technology based on the most widely-installed local area network (LAN) technology. It provides a data rate of 1 billion bits per second, is defined in the IEEE 802.3 standard and is currently being used as the backbone in many enterprise networks.

a. iSCSI
b. Fibre Channel
c. Gigabit Ethernet
d. asynchronous transfer mode (ATM)
e. UHF

Click to see if you are correct.

Question #30

This is a technology that puts data from different sources together on an optical fiber, with each signal carried at the same time on its own separate light wavelength. It promises wide bandwidth communications for SANs.

a. frequency-division multiplexing (FDM)
b. dense wavelength division multiplexing (DWDM)
c. time-division multiplexing (TDM)
d. traditional multiplexing (MUX)
e. multiplexer
#144
Chat Box / Re: QUIZ:"Storage"
Nov 15, 2008, 02:39 PM
Quiz #5: Storage area networks

Question #41
SAN expert Chris Poelker recently listed his six-step prescription for SAN backup. Listed below are four of those steps but which one is NOT one of the six?
a. Consolidate your server environment using clustering for better availability with fewer servers
b. Incorporate all servers into the SAN
c. Use SAN based storage for file services if you can
d. For remote servers, if your network supports it, use iSCSI connections into the SAN to consolidate backup across the enterprise
Click to see if you are correct.

Question #42
This is an Internet protocol-based storage networking technology developed by the Internet Engineering Task Force (IETF). Its mechanisms enable the transmission of Fibre Channel (FC) information by tunneling data between storage area network (SAN) facilities over IP networks; this capacity facilitates data sharing over a geographically distributed enterprise.
a. iSCSI
b. iFCP
c. FCIP
d. SCSI
Click to see if you are correct.

Question #43
Your environment supports three different types of operating systems: Linux, Win2000 and Tru64. Can you use all three with SAN technology?
a. Yes
b. No
c. Only Linux and Win2000
d. Only Tru64
e. None of the above
Click to see if you are correct.

Question #44
This is the primary organization for fostering the development of technology standards in the United States. It works with industry groups and long-established computer standards from this organization include the American Standard Code for Information Interchange (ASCII) and the Small Computer System Interface (SCSI).
a. ISO
b. BCBS
c. IBTA
d. ANSI
e. IEC
Click to see if you are correct.

Question #45
How can you tell the difference between SCSI and IDE hard drives?
a. Check the instruction manual
b. Ask the guy sitting next to you
c. Read the labels
d. There is no noticeable difference
e. Ask the vendor
Click to see if you are correct.

Question #46
This technology transmits data between computer devices at a data rate of 1 or 2 Gbps (and 10 Gbps in the near future). It is especially suited for connecting computer servers to shared storage devices and for interconnecting storage controllers and drives.
a. Fiber connectivity
b. Legacy cabling
c. High speed Internet
d. Fibre Channel
e. Fiber optic
Click to see if you are correct.

Question #47
SAN expert Chris Poelker pointed out the many benefits of moving towards a SAN strategy. Listed below are five benefits. Which one is NOT listed by Chris?
a. Increased disk utilization
b. Decreased workload
c. Improved DR capabilities
d. Improved overall availability
e. Support server clustering
Click to see if you are correct.

Question #48
This is a network -- typically a storage network -- that channels incoming data flow from any of multiple input ports to the output port. Used with multiple storage disk drives, it is said to be able to improve latency and to ensure "fairness."
a. Switch-on-a-chip
b. External storage
c. Fibre Channel
d. Salsa-on-a-chip
e. Direct-attached storage
Click to see if you are correct.

Question #49
This is a centralized repository for business information that provides common data management and protection, as well as data sharing functions, through connections to numerous computer systems.
a. File storage
b. Enterprise storage
c. Lock box
d. Block storage
e. Savings and Loan
Click to see if you are correct.

Question #50
SAN expert Christopher Poelker says that in general, there are a few basic areas where employing a SAN can reduce overall storage costs significantly. Which of the five choices listed below is NOT one them?
a. Availability
b. Storability
c. Management
d. Disk utilization
e. Backup
#145
Chat Box / Re: QUIZ:"Storage"
Nov 15, 2008, 01:37 PM
Storage: Do you speak geek?

1. This is a temporary storage area in a computer where the operating system, application programs, and other data in current use are kept so that they can be quickly reached by the computer's processor. It maintains data only as long as a computer is running and reloads it each time the computer is turned on.
What is it?

2. This is a type of RAM chip that improves the time to read from memory on faster microprocessors.
What is it?

3. This is a user-modifiable read-only memory that can be erased and rewritten repeatedly through the application of higher than normal electrical voltage.
What is it?

4. This is a special battery-powered form of RAM in certain Macintosh computers that stores vital system information, such as the date, time, and configuration settings. Because PRAM is powered by an internal battery, the information isn't lost when you turn the computer off as it is with regular RAM.
What is it?

5. This is an adaptation of the CD that is designed to store computer data in the form of text and graphics, as well as hi-fi stereo sound.
What is it?

6. This is a type of constantly-powered nonvolatile memory that can be erased and rewritten, often used to hold control code, such as the basic input/output system (BIOS), in a personal computer.
What is it?

7. This is very high-performance video RAM that is dual-ported and has about 25% more bandwidth than VRAM but costs less, and is more efficient to read data for use in block fills and text drawing.
What is it?

8. This is often called the frame buffer, it's a special arrangement of dynamic RAM (DRAM) used to store image data for a computer display.
What is it?

9. This is a protocol-based approach in which all signals to RAM are on the same line rather than separated by type; since access time does not depend on synchronizing operations on multiple lines, SLDRAM promises RAM speed of up to 800 MHz and can operate at twice the system clock rate.
What is it?

10. This is moderately fast and inexpensive clock-synchronized RAM that is used for video memory.
What is it?
#146
Chat Box / Re: QUIZ:"Storage"
Nov 15, 2008, 12:54 PM
RAID technology quiz

1. When run by itself, this type of RAID, which does not live up to its name, reduces the level of protection for data.
Answer
2. This type of drive suffers from reliability concerns, causing many Tier 2 storage users to embrace dual-parity schemes, like RAID 6.
Answer

3. This RAID type is seen in SATA environments.
Answer

4. On which RAID level is all of the data on one disk copied exactly onto a second disk, with neither disk being primary or master?
Answer

5. Although storage arrays can gather a huge number of disks, how many disks in a RAID group do most general-purpose servers employ?
Answer
6. At what level of RAID is the parity divided, with a share being given to each disk in the array?
Answer

7. This RAID level is a combination of two basic RAID techniques. It combines striping with independent data disks with distributed parity.
Answer

8. What can be used to accomplish redundancy where contents are directly duplicated onto another drive?
Answer

9. This is the process of dividing a body of data into blocks and spreading the data blocks across several partitions on several hard disks.
Answer

10. This RAID level confers benefits in recovery and reliability, albeit at the cost of halving the storage capacity of the RAID array.
Answer
#147
Chat Box / Re: QUIZ:"Storage"
Nov 15, 2008, 12:07 PM
Quiz: Improve your memory!

1. If you loaded your pickup truck full of books, how much data would it hold?
a. 650 megabytes
b. a half-terabyte
c. a gigabyte
Answer

2. The Blu-ray format uses a blue-violet laser to increase storage density -- what color laser do DVD drives use to write data?
Answer

3. This is a software utility used to increase storage efficiency by rearranging discontiguous file segments. What is it?
Answer

4. Which of these sequences lists the following in increasing magnitude?
a. petabyte, terabyte, exabyte
b. terabyte, petabyte, exabyte
c. terabyte, exabyte, petabyte
Answer

5. How many feature-length movies could you store on a terabyte disk?
a. Almost 200
b. 200-300
c. Over 300
Answer

6. Which of the following statements is true?
  a. A high-resolution photograph requires as much storage space as a short novel.
  b. A high-resolution photograph requires twice as much storage space as a short novel.
  c. A high-resolution photograph requires half as much storage space as a short novel.
Answer

7. What's the most information a DVD can hold?
a. 650 megabytes
b. 17 gigabytes
c. 34 gigabytes
Answer

8. Help me Obi-Wan Kenobi! This type of storage uses laser beams to store computer-generated data in three dimensions. What is it?
Answer

9. A diskette is a small removeable storage format in a rigid casing -- so why are they often called floppies?
Answer

10. What does DVD stand for?
a. digital video disc
b. nothing
c. digital versatile disc
d. data-versatile disc
Answer
#148
Chat Box / Re: QUIZ:"Storage"
Nov 15, 2008, 11:41 AM

Data storage hardware quiz

1. This is a new standard for connecting hard drives into computer systems. It is based on serial signaling technology, unlike current IDE hard drives that use parallel signaling.
What is it?

2. This is a method used in accessing computer peripheral devices that employs a serial means of digital data transfer over thin cables.
What is it?

3. This allows transmittal of data between computer devices at data rates of up to 4Gbps.
What is it?

4. This is a method for storing information on multiple devices.
What is it?

5. This is a device that stores computer data on a loop of flexible celluloid-like material that can be read and also erased.
What is it?

6. This is an archival storage technology that makes it possible to save data as if it were being stored on tape although it may actually be stored on hard disk or another storage medium.
What is it?

7. This is a device that channels incoming data from any of multiple input ports to the specific output port that will take the data toward its intended destination.
What is it?

8. This is a circuit board and/or integrated circuit adapter that provides input/output processing and physical connectivity between a server and a storage device.
What is it?

9. This is a kind of copper cable that includes one physical channel that carries the signal surrounded by another concentric physical channel, both running along the same axis.
What is it?

10. This is the technology associated with the transmission of information as light pulses along a glass or plastic wire or fiber.
What is it?
#149
Chat Box / Re: QUIZ:"Storage"
Nov 15, 2008, 11:36 AM
Quiz: Data Storage

Computer storage is the holding of data in an electromagnetic form for access by a computer processor. Primary storage is data in random access memory (RAM) and other "built-in" devices. Secondary storage is data on hard disk, tapes, and other external devices.

1. This is a utility that rearranges your discontiguous files and freespace on your computer so that your files are stored in contiguous unitsand free space is consolidated in one contiguous block.
a. degaussing
b. patch
c. defragmenter
d. parser
e. logicalblock addressing

2. This is a company that provides computer storage space and relatedmanagement to other companies.
a. vortal
b. storagearea network
c. storagemedium
d. bastion host
e. storageservice provider

3. This is a format for storing and backing up computer data on tapethat evolved from the Digital Audio Tape (DAT) technology.
a. TapeArchive
b. DigitalData Storage
c. virtualtape system
d. AudioInterchange File Format
e. dataaggregation

4. This is a storage management system especially designed for movinglarge files and large amounts of data around a network.
a. hierarchicalstorage management
b. enterpriseresource management
c. highperformance storage system
d. distributedfile system
e. holographicstorage

5. This is a form of static random access memory whose contents aresaved when a computer is turned off or loses its external power source.
a. SynchBurstSRAM
b. staticIP
c. nonvolatilestorage
d. magnetoresistiverandom access memory
e. directmemory access

6. This is a centralized repository for business information that providescommon data management and protection, as well as data sharing functions,through connections to numerous (and possibly dissimilar) computer systems.
a. callcenter
b. enterprisestorage network
c. GrandCentral Station
d. networkinformation system
e. ADSTARDistributed Storage Management

7. This is programmable read-only memory that can be erased by shiningan intense ultraviolet light through a window in the memory chip so thatthe memory can be re-used.
a. SequentialCouleur avec Memoire
b. virtualmemory
c. gratinglight valve technology
d. extremeultraviolet lithography
e. erasableprogrammable read-only memory

8. This is a way of storing the same data in different placeson multiple hard disks.
a. doubledata rate synchronous dynamic random access memory
b. redundantarray of independent disks
c. network-attachedstorage
d. extendeddata output (EDO) RAM
e. randomaccess method of accounting and control

9. This is a data storage technology that allows information tobe written to a disk a single time and prevents the drive from erasingthe data.
a. writeonce / read many
b. backupdomain control
c. singleinstruction multiple data
d. permanentvirtual circuit
e. compactdisk / read-only-memory, extended architecture

10. This is what might occur when a program or process tries to storemore data in a temporary data storage area than it was intended to hold.
a. programtemporary fix
b. bluescreen of death
c. fatalexception
d. sharedmemory
e. bufferoverflow
#150
Chat Box / Re: QUIZ:"Storage"
Nov 15, 2008, 11:35 AM
Quiz: Database Basics

1. This is a collection of data items organized as a set of formally-described tables from which data can be accessed or reassembled in many different ways without having to reorganize the database tables.
a. relational database
b. array
c. file allocation table
d. splay tree
e. Venn diagram

2. This is a standard interactive and programming language for getting information from and updating a database.
a. Dynamic Data Exchange
b. Structured Query Language
c. ASCII
d. Erlang programming language
e. WebLogic

3. In creating a database, this is the process of organizing it into tables insuch a way that the results of using the database are always unambiguous.
a. probability
b. normalization
c. data modeling
d. Query by Example
e. virtual organization

4. In 1977, this company set out to prove that the prevailing theory that relationship databases lacked commercial viability, was wrong.
a. Hewlett-Packard
b. Oracle
c. Cognos
d. Solaris
e. Sybase

5. This family of products is IBM's cross-platform relational database management system.
a. DBA
b. B2B
c. PHP
d. RDF
e. DB2

6. This type of database, which can be used to mine data for business trends, doesn't require SQL queries, but instead allows a user to ask questions like "How many Aptivas have been sold in Nebraska so far this year?".
a. line information database
b. High Performance Storage System
c. object-oriented database management system
d. multidimensional database
e. functional specification

7. This is an open standard application programming interface (API) for accessing a database.
a. Universal Data Access
b. Open Database Connectivity
c. Topic Map Query Language
d. Open Data-Link Interface
e. command line interface

8. This term, used to describe a database that occupies magnetic storage in the terabyte range, describes a database that contains billions of table rows.
a. Very Large Database
b. holographic storage
c. Cold Fusion
d. giant
e. Electronic Data Interchange

9. This is a collection of descriptions about data objects that is created for the benefit of programmers and others who might need torefer to them.
a. data dictionary
b. stored procedure
c. Virtual File Allocation Table
d. Virtual Address eXtension
e. catalog

10. This term is used to describe the process of forecasting, or simply discovering patterns in data that can lead to predictions about the future.
a. customer relationship management
b. PERT chart
c. data mining
d. enterprise risk management
e. histogram
#151
Chat Box / QUIZ:"Storage"
Nov 15, 2008, 11:33 AM
Data storage technologies quiz

Sit down, grab a pencil and some paper, and list what you think are the top 10 data storage technologies of 2006. Then, take our quick quiz to see how many match up to our top 10 picks. 1. Sometimes called oversubscription, this is a way to quickly get capacity to an application.
Answer

2. This is the pooling of physical storage from multiple network storage devices into what appears to be a single storage device that is managed from a central console.
Answer

3. This technology can be used to protect data in flight across a network and at rest on tape in the data center.
Answer

4. This is an alternative to the Fibre Channel framework of the traditional SAN.
Answer

5. This is an architecture and specification for data flow between processors and I/O devices that promises greater bandwidth and almost unlimited expandability.
Answer

6. This is a storage technology that makes it possible to access a remote data center as though it were local.
Answer

7. This technology makes data retrieval straightforward by storing it in such a way that an object cannot be duplicated or modified once it has been stored; thus, its location is unambiguous.
Answer

8. This is a storage system in which all the data in an enterprise is backed up whenever any change is made.
Answer

9. This is sometimes called data reduction or commonality factoring and is another space-saving technology intended to eliminate redundant files on a storage system.
Answer

10. This technology is the assignment of different categories of data to different types of storage media in order to reduce total storage cost.
Answer

How did you score?
9-10 correct: You're a real hot techie tamale
6-8 correct: You're hot tech talented for sure
3-5 correct: You've got hot tech troubles
0-2 correct: Ho hum, just a tech tadpole
#152
Chat Box / Re: quiz: "Messaging and E-Mail"
Nov 14, 2008, 05:03 PM
Email marketing quiz ANSWERS

ANSWER FOR 10


Answer: spambot

A spambot is a program designed to collect, or harvest, email addresses from the Internet in order to build mailing lists for sending unsolicited email, also known as spam. A spambot can gather email addresses from Web sites, newsgroups...
#153
Chat Box / Re: quiz: "Messaging and E-Mail"
Nov 14, 2008, 05:03 PM
Email marketing quiz ANSWERS

ANSWER FOR 9


Answer: opt-in email

Opt-in email is a Web marketing term for email that recipients have previously requested by signing up at a Web site or special ad banner. Typically, Web users are invited to sign up for promotional information about one or more categories of products or services. Those who sign up have thus "opted in"...
#154
Chat Box / Re: quiz: "Messaging and E-Mail"
Nov 14, 2008, 05:02 PM
Email marketing quiz ANSWERS

ANSWER FOR 8


Answer: direct email marketing

Direct email marketing is a format for email-based campaigns in which standalone advertisements are sent to a targeted list of recipients. The messages, which may be text, HTML or rich media, look like Web-based ads rather than typical email messages. A number of elements make direct email marketing different from spam...
#155
Chat Box / Re: quiz: "Messaging and E-Mail"
Nov 14, 2008, 05:01 PM
Email marketing quiz ANSWERS

ANSWER FOR 7


Answer: spam filter

A spam filter is a program that is used to detect unsolicited and unwanted email and prevent those messages from getting to a user's inbox. Like other types of filtering programs...
#156
Chat Box / Re: quiz: "Messaging and E-Mail"
Nov 14, 2008, 05:01 PM
Email marketing quiz ANSWERS

ANSWER FOR 6


Answer: clickthrough rate

In banner advertising on a Web site, the clickthrough rate (CTR) is the percentage of times that viewers of a Web page click on a given banner ad, causing a request for the advertiser's Web site to be transmitted to the viewer. For example, if two out of every 100 visitors to a Web page clicked on a given ad...
#157
Chat Box / Re: quiz: "Messaging and E-Mail"
Nov 14, 2008, 04:58 PM
Email marketing quiz ANSWERS

ANSWER FOR 5


Answer: UBE

UBE (unsolicited bulk email) is a formal term for spam. The most common type of UBE is unsolicited commercial email (UCE)...
#158
Chat Box / Re: quiz: "Messaging and E-Mail"
Nov 14, 2008, 04:58 PM
Email marketing quiz ANSWERS

ANSWER FOR 4


Answer: transactional email

Transactional email is a type of Web-based marketing in which email recipients can buy goods and services directly from an email message, without being redirected to the retailer's Web site. According to proponents, transactional email leads to significantly higher conversion rates -- the ratio of shoppers to buyers, which goes up when the former is converted to the latter -- than regular email marketing approaches. A number of different transactional email products are available...
#159
Chat Box / Re: quiz: "Messaging and E-Mail"
Nov 14, 2008, 04:57 PM
Email marketing quiz ANSWERS

ANSWER FOR 3


Answer: bounce email

Bounce email (sometimes referred to as bounce mail) is electronic mail that is returned to the sender because it cannot be delivered for some reason. Unless otherwise arranged, bounce email usually appears as a new note in your inbox. There are two kinds of bounce email: hard bounce and soft bounce...
#160
Chat Box / Re: quiz: "Messaging and E-Mail"
Nov 14, 2008, 04:57 PM
Email marketing quiz ANSWERS

ANSWER FOR 2


Answer: email spoofing

Email spoofing is the forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations. Spoofing can be used legitimately...
#161
Chat Box / Re: quiz: "Messaging and E-Mail"
Nov 14, 2008, 04:56 PM
Email marketing quiz ANSWERS

ANSWER FOR 1


Answer: personalization

On a Web site, personalization is the process of tailoring pages to individual users' characteristics or preferences. Commonly used to enhance customer service or e-commerce sales, personalization is sometimes referred to as one-to-one marketing, because the enterprise's Web page is tailored to specifically target each individual consumer. Personalization is a means of meeting the customer's needs more effectively and efficiently...
#162
Chat Box / Re: quiz: "Messaging and E-Mail"
Nov 14, 2008, 04:55 PM
Quote from: dwarakesh on Nov 14, 2008, 12:27 PM
Hi Acumens


      Plz  post the answer

HI ACUMEN,

THANKS FOR INVOLVEMENT

K IM UPDATING NOW.
#163
Chat Box / Re: Quiz: Compliance
Nov 14, 2008, 04:38 PM
Quiz: Compliance ANSWERS

ANSWER FOR 10

The DVD Forum is an international organization made up of companies using or manufacturing digital versatile disc (DVD)-related products. The Forum, which was originally called the DVD Consortium, was created in 1995 when ten companies (Hitachi, Matsushita, Mitsubishi, Philips, Pioneer, Sony, Thomson Multimedia, Time Warner, Toshiba Corporation, and Victor) joined for the common purpose of promoting DVD worldwide and establishing standardized formats of each DVD application for the marketplace.

From ten founding members, the DVD Forum membership has grown to include some 230 companies worldwide. The Forum's activities are directed by a steering committee that is elected every second year. Separate working groups are established to define specifications, which currently include DVD-Video (this is the most familiar format), DVD-Read-Only Memory (DVD-ROM), DVD-Recordable (DVD-R), DVD-Rewritable (DVD-RW), and DVD-Audio (DVD-A). The DVD Forum issues specifications as separate books of the DVD specification, identified by letters (for example, DVD-R is laid out in Book D). A Verification Task Force (VTF) exists to define test specifications, tools, and procedures to be used and to ensure that products bearing the official DVD logo comply with all specifications.
#164
Chat Box / Re: Quiz: Compliance
Nov 14, 2008, 04:37 PM
Quiz: Compliance ANSWERS

ANSWER FOR 9

The "do not call" list is a registry of phone numbers in the United States that telemarketers are prohibited from calling in most circumstances. The list is maintained by the National Do Not Call Registry of the Federal Trade Commission (FTC), and consumers can contact the agency to have their numbers registered. Organizations are prohibited from making calls to sell goods or services to any numbers listed, and are subject to substantial fines if they fail to comply.

Political organizations, charities, surveyors and companies that a consumer has a pre-existing relationship with are exempt from the restriction, although they must comply with some rules. Once your registration goes into effect (usually three months after you apply) organizations can call to ask you to take a survey or make a donation, but cannot try to sell you anything. In the case of a pre-existing relationship, a company can call you for up to 18 months after a purchase, delivery, or payment, although if you ask them not to call again they are required to honor your request. All organizations must refrain from calling anyone who asks them not to, and must maintain their own "do not call" lists of such numbers.

Consumers have responded enthusiastically to the list: the agency started registering phone numbers in late June of 2003, and by mid-August had added over 30 million numbers. For marketers, however, the list has required fundamental changes to the way they conduct business. Even in advance of the registry's implementation many marketers have turned to e-mail campaigns as a replacement for telemarketing, which has contributed to the rapid increase in the growth of spam. According to Brightmail Probe Network research, in September 2003 spam accounted for 54% of all Internet e-mail, up from 18% in April 2002. Industry experts recommend that marketers rely on opt-in e-mail rather than unsolicited commercial e-mail (UCE), and use techniques such as customer segmentation and direct e-mail marketing to send appropriate -- and possibly even welcome -- messages.

Other countries besides the United States maintain similar do not call lists. For example, the U.K. offers a Telephone Preference Service (and a Mail Preference Service for postal mail).
#165
Chat Box / Re: Quiz: Compliance
Nov 14, 2008, 04:37 PM
Quiz: Compliance ANSWERS

ANSWER FOR 8

The Telecommunications Act of 1996, enacted by the U.S. Congress on February 1, 1996, and signed into law by President Bill Clinton on February 8, 1996, provided major changes in laws affecting cable TV, telecommunications, and the Internet. The law's main purpose was to stimulate competition in telecommunication services. The law specifies:

    * How local telephone carriers can compete
    * How and under what circumstances local exchange carriers (LEC) can provide long-distance services
    * The deregulation of cable TV rates

Included with the Act was the former Communications Decency Act, which, among other provisions, makes it a crime to convey pornography over the Internet in a way that is easily accessible to children.
#166
Chat Box / Re: Quiz: Compliance
Nov 14, 2008, 04:36 PM
Quiz: Compliance ANSWERS

ANSWER FOR 7

RIAA

The RIAA (Recording Industry Association of America) is an organization that represents the music recording industry's intellectual property rights. The organization has taken an especially aggressive stance against Internet users who want to be able to freely copy published music. RIAA states that its mission is "to foster a business and legal climate that supports and promotes our members' creative and financial vitality." According to an RIAA estimate, its members create, manufacture, or distribute about 90% of all legally made audio recordings that are produced and sold in the United States.

A major focus of the RIAA's attention is piracy or the illegal copying and distribution of sound recordings. RIAA classifies music piracy into four (possibly overlapping) categories.

    * Pirate recordings are illegally duplicated copies of the sound portion of a lawful recording, without any duplication of the packaging.
    * Counterfeit recordings are illegally duplicated copies of the sound and its packaging, so that, for example, a counterfeit CD resembles the legitimate product.
    * Bootleg recordings are illegal recordings of live or broadcast music.
    * Online piracy is the unauthorized uploading or downloading of copyrighted recordings to or from a Web site such as Napster .

This last category is increasingly practiced, and particularly difficult to defend against, although digital rights management ( DRM ) products are being developed as one means of doing so. RIAA's recommendations for anti-piracy measures are sometimes controversial, with some people believing that they infringe on individual rights, such as the right to privacy of information. For example, many people believe that they have a right to share information from their computers, as long as the exchange is not for profit. RIAA, on the other hand, considers such sharing of copyrighted media to be theft.

#167
Chat Box / Re: Quiz: Compliance
Nov 14, 2008, 04:35 PM
Quiz: Compliance ANSWERS

ANSWER FOR 6

HIPAA is the United States Health Insurance Portability and Accountability Act of 1996. There are two sections to the Act. HIPAA Title I deals with protecting health insurance coverage for people who lose or change jobs. HIPAA Title II includes an administrative simplification section which deals with the standardization of healthcare-related information systems. In the information technology industries, this section is what most people mean when they refer to HIPAA. HIPAA establishes mandatory regulations that require extensive changes to the way that health providers conduct business.

HIPAA seeks to establish standardized mechanisms for electronic data interchange (EDI), security, and confidentiality of all healthcare-related data. The Act mandates: standardized formats for all patient health, administrative, and financial data; unique identifiers (ID numbers) for each healthcare entity, including individuals, employers, health plans and health care providers; and security mechanisms to ensure confidentiality and data integrity for any information that identifies an individual.
#168
Chat Box / Re: Quiz: Compliance
Nov 14, 2008, 04:34 PM
Quiz: Compliance ANSWERS

ANSWER FOR 5

The National Computer Security Center (NCSC) is a U.S. government organization within the National Security Agency (NSA) that evaluates computing equipment for high security applications to ensure that facilities processing classified or other sensitive material are using trusted computer systems and components. NCSC was founded in 1981 as the Department of Defense Computer Security Center and changed to its current name in 1985. The organization works with industry, education, and government agency partners to promote research and standardization efforts for secure information system development. The NCSC also functions in an educational capacity to disseminate information about issues surrounding secure computing, most significantly through its annual National Information Systems Security Conference.

The NCSC's computer evaluation program is carried out by another NSA organization, the Trusted Product Evaluation Program (TPEP), which tests commercial products against a comprehensive set of security-related criteria. NCSC issued the first Department of Defense (DoD) Trusted Computer System Evaluation Criteria (TCSEC) in August, 1983. The document, more commonly referred to as the "orange book," was reissued in 1985 as a DoD standard that included the stated goals of providing manufacturers with security-related standards regarding features for inclusion in products, and providing DoD components with information about security metrics for the evaluation of trust levels to be accorded various products used for processing sensitive material.
#169
Chat Box / Re: Quiz: Compliance
Nov 14, 2008, 04:33 PM
Quiz: Compliance ANSWERS

ANSWER FOR 4

Compliance is either a state of being in accordance with established guidelines, specifications, or legislation or the process of becoming so. Software, for example, may be developed in compliance with specifications created by some standards body, such as the Institute of Electrical and Electronics Engineers (IEEE), and may be distributed in compliance with the vendor's licensing agreement. In the legal system, compliance usually refers to behavior in accordance with legislation, such as the United States' Can Spam Act of 2003, the Sarbanes-Oxley Act (SOX) of 2002, or HIPAA (United States Health Insurance Portability and Accountability Act of 1996).

Compliance in a regulatory context is a prevalent business concern, perhaps because of an ever-increasing number of regulations and a fairly widespread lack of understanding about what is required for a company to be in compliance with new legislation. In the financial sector, SOX was enacted in response to the high-profile Enron and WorldCom financial Removed to protect shareholders and the general public from accounting errors and fraudulent practices in the enterprise. In the healthcare sector, HIPAA Title II includes an administrative simplification section which mandates standardization of healthcare-related information systems.

As compliance has increasingly become a concern of corporate management, corporations are turning to specialized software, consultancies, and even a new job title, the Chief Compliance Officer (CCO)
#170
Chat Box / Re: Quiz: Compliance
Nov 14, 2008, 04:32 PM
Quiz: Compliance ANSWERS

ANSWER FOR 3

The Can Spam Act of 2003 is a commonly used name for the United States Federal law more formally known as S. 877 or the "Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003." The law took effect on January 1, 2004. The Can Spam Act allows courts to set damages of up to $2 million when spammers break the law. Federal district courts are allowed to send spammers to jail and/or triple the damages if the violation is found to be willful.

The Can Spam Act requires that businesses:

      - Clearly label commercial e-mail as advertising
      - Use a truthful and relevant subject line
      - Use a legitimate return e-mail address
      - Provide a valid physical address
      - Provide a working opt-out option
      - Process opt-out requests within ten business days

Critics of the Can Spam Act warn it will be next to impossible to enforce the legislation because spam is an international problem and the US government will not be able to impose punishment on law-breakers outside its own jurisdiction. Proponents maintain that stiff monetary penalties will eventually createa financial disincentive for spam and the new law is a step in the right direction, especially if followed up with a national "do not spam" list. The Direct Marketing Association (DMA), the Association of National Advertisers (ANA) and the American Association of Advertising Agencies (AAAA) have applauded the legislation. Those without ties to marketing and advertising, on the other hand, are generally less enthusiastic about the Act, because as is, it legitimizes the sending of unsolicited bulk e-mail (UBE). Some media pundits have made pointed references to an unintended second meaning for "Can Spam" as in "You CAN spam, as long as you follow these rules."
#171
Chat Box / Re: Quiz: Compliance
Nov 14, 2008, 04:29 PM
Quiz: Compliance ANSWERS

ANSWER FOR 2

The Sarbanes-Oxley Act of 2002 (often shortened to SOX) is legislation enacted in response to the high-profile Enron and WorldCom financial Removed to protect shareholders and the general public from accounting errors and fraudulent practices in the enterprise. The act is administered by the Securities and Exchange Commission (SEC), which sets deadlines for compliance and publishes rules on requirements. Sarbanes-Oxley is not a set of business practices and does not specify how a business should store records; rather, it defines which records are to be stored and for how long. The legislation not only affects the financial side of corporations, but also affects the IT departments whose job it is to store a corporation's electronic records. The Sarbanes-Oxley Act states that all business records, including electronic records and electronic messages, must be saved for "not less than five years." The consequences for non-compliance are fines, imprisonment, or both. IT departments are increasingly faced with the challenge of creating and maintaining a corporate records archive in a cost-effective fashion that satisfies the requirements put forth by the legislation.

The following sections of Sarbanes-Oxley contain the three rules that affect the management of electronic records. The first rule deals with destruction, alteration, or falsification of records.

    Sec. 802(a) "Whoever knowingly alters, destroys, mutilates, conceals, covers up, falsifies, or makes a false entry in any record, document, or tangible object with the intent to impede, obstruct, or influence the investigation or proper administration of any matter within the jurisdiction of any department or agency of the United States or any case filed under title 11, or in relation to or contemplation of any such matter or case, shall be fined under this title, imprisoned not more than 20 years, or both."

The second rule defines the retention period for records storage. Best practices indicate that corporations securely store all business records using the same guidelines set for public accountants.

    Sec. 802(a)(1) "Any accountant who conducts an audit of an issuer of securities to which section 10A(a) of the Securities Exchange Act of 1934 (15 U.S.C 78j-1(a)) applies, shall maintain all audit or review workpapers for a period of 5 years from the end of the fiscal period in which the audit or review was concluded."

This third rule refers to the type of business records that need to be stored, including all business records and communications, including electronic communications.

    Sec. 802(a)(2) "The Securities and Exchange Commission shall promulgate, within 180 days, such rules and regulations, as are reasonably necessary, relating to the retention of relevant records such as workpapers, documents that form the basis of an audit or review, memoranda, correspondence, communications, other documents, and records (including electronic records) which are created, sent, or received in connection with an audit or review and contain conclusions, opinions, analyses, or financial data relating to such an audit or review."
#172
Chat Box / Re: Quiz: Compliance
Nov 14, 2008, 04:24 PM
Quiz: Compliance ANSWERS

ANSWER FOR 1

A Chief Compliance Officer (CCO) is a corporate official in charge of overseeing and managing compliance issues within an organization, ensuring, for example, that a company is complying with regulatory requirements, and that the company and its employees are complying with internal policies and procedures. CCO is one of a growing number of fairly new corporate titles including CEO, CFO, CIO, CTO, and CSO.

Corporations have become concerned about compliance because of increasingly stringent legal requirements. In the wake of the Enron and WorldCom accounting Removed, the United States federal government has passed legislation to guard against corporate fraud. The Sarbanes-Oxley Act, for example, stipulates how corporations must report their financial results, and makes executives responsible for accounting irregularities.

CCO is sometimes said to stand for Corporate Compliance Officer.
#173
Chat Box / Re: quiz:"Business Intelligence"
Nov 14, 2008, 04:22 PM
hi sankarakrishnan,

did u went through the updation made??

thanks for ur involvement in gaining knowledge
#174
Chat Box / Re: quiz:"Business Intelligence"
Nov 14, 2008, 04:22 PM
quiz :BUSINESS INTELLIGENCE
                                     I personally feel this quiz topic ,it is essential & can read by everyone and must read one.
#175
Chat Box / Re: quiz:"Business Intelligence"
Nov 14, 2008, 04:16 PM
Quiz: Negotiating -- Do you speak business? ANSWERS

ANSWER FOR 10

In negotiations, always have a partner. Never work alone.

True Explain that there is another party, who isn't present, that you need to consult with. The party can be real or imaginary. Their existence not only helps buy you time and prevent rash decisions, it also opens the door for counter offers.
#176
Chat Box / Re: quiz:"Business Intelligence"
Nov 14, 2008, 04:14 PM
Quote from: sankarakrishnan on Nov 14, 2008, 04:05 PM
Thanks for your intelligence post..but make it as order...it may confusing some times ;)

hi sankarakrishnan,

thank u for ur involvement...k i definitely make it as order ...i like to know which order sequence u want????? and also check my updation.

keep reading/searching...and gain knowledge.
#177
Chat Box / Re: quiz:"Business Intelligence"
Nov 14, 2008, 04:09 PM
Quiz: Negotiating -- Do you speak business? ANSWERS

ANSWER FOR 9

True. Many agreements have been struck just because one side is worn out and can't stand the thought of going through the process again with another party.
#178
Chat Box / Re: quiz:"Business Intelligence"
Nov 14, 2008, 04:08 PM
Quiz: Negotiating -- Do you speak business? ANSWERS

ANSWER FOR 8

If you think you won, you did. On the other hand, if you think you were cheated, you did get cheated. Before beginning negotiations you should ask yourself two questions: "What is my best-case scenario? What is the least I'm willing to settle for?" The area in between is called your settlement range. If you can reach an agreement within your settlement range, it's a win!
#179
Chat Box / Re: quiz:"Business Intelligence"
Nov 14, 2008, 04:08 PM
Quiz: Negotiating -- Do you speak business? ANSWERS

ANSWER FOR 7

False. Many managers make the mistake of thinking the vendor is a partner and will often give them information about budgets and products. Our expert says don't do it -- you're simply handing the vendor all your negotiating leverage.
#180
Chat Box / Re: quiz:"Business Intelligence"
Nov 14, 2008, 04:07 PM
Quiz: Negotiating -- Do you speak business? ANSWERS

ANSWER FOR 6

a. Accept that negotiations have been re-opened and go from there.

When you're deep into negotiations, it's easy to lose your patience. If something unforseen happens at the last minute, don't give up and walk away. Keep talking and look for a workable alternative
#181
Chat Box / Re: quiz:"Business Intelligence"
Nov 14, 2008, 04:06 PM
Quiz: Negotiating -- Do you speak business? ANSWERS

ANSWER FOR 5

In negotiation, winner's curse is an offer that is immediately accepted by the other party. The term implies that although the offer was accepted, the person making the offer failed to get as good a deal as possible.
#182
Chat Box / Re: quiz:"Business Intelligence"
Nov 14, 2008, 04:06 PM
Quiz: Negotiating -- Do you speak business? ANSWERS

ANSWER FOR 4

The tipping point is the critical point in an evolving situation that leads to a new and irreversible development. The term is said to have originated in the field of epidemiology when an infectious disease reaches a point beyond any local ability to control it from spreading more widely. A tipping point is often considered to be a turning point.

The term is now used in many fields. Journalists apply it to social phenomena, demographic data, and almost any change that is likely to lead to additional consequences. Marketers see it as a threshold that, once reached, will result in additional sales. In some usage, a tipping point is simply an addition or increment that in itself might not seem extraordinary but that unexpectedly is just the amount of additional change that will lead to a big effect. In the butterfly effect of chaos theory, for example, the small flap of the butterfly's wings that in time leads to unexpected and unpredictable results could be considered a tipping point. However, more often, the effects of reaching a tipping point are more immediately evident. A tipping point may simply occur because a critical mass has been reached.

Things that have been said to be about to reach a tipping point include: society's willingness to tolerate gay marriage, RFID technology in retail sales, and the widespread adoption of Web services.
#183
Chat Box / Re: quiz:"Business Intelligence"
Nov 14, 2008, 04:03 PM
Quiz: Negotiating -- Do you speak business? ANSWERS

ANSWER FOR 3

In purchasing, bundling is the practice of marketing two or more products or services in a single package with one price.
#184
Chat Box / Re: quiz:"Business Intelligence"
Nov 14, 2008, 03:59 PM
Quiz: Negotiating -- Do you speak business? ANSWERS

ANSWER FOR 2

Boulwarism

In negotiation, a Boulwarism is an offer or counter-offer that is not meant to be negotiated. This "take it or leave it" strategy is named after Lemuel Boulware, a former vice president of General Electric. When faced with a strike, Boulware is famous for telling the International Union of Electrical Workers (IUE) at the onset of negotiations that the company had already evaluated the workers' needs and was putting forth its "first, last and best offer" on the table.
#185
Chat Box / Re: quiz:"Business Intelligence"
Nov 14, 2008, 03:59 PM
Quiz: Negotiating -- Do you speak business? ANSWERS

ANSWER FOR 1

reciprocity

In negotiation, reciprocity is a mutual or cooperative exchange of favors or privileges. It is exemplified by the American expression "You scratch my back, and I'll scratch yours" and the Latin expression "Quid pro quo" (meaning something for something).
#186
Chat Box / Re: quiz:"Business Intelligence"
Nov 14, 2008, 03:56 PM
quiz:Business Intelligence ANSWER KEY

ANSWER KEY


1.)c. permission marketing

2.) e. personalization

3.) d. CRM analytics

4.) d. business intelligence

5.) a. database marketing

6.) c. hosted CRM

7.) b. BPML

8.) a. contact center

9.) d. customer segmentation

10.) e. predictive modeling
#187
"be good do good"
#188
Chat Box / Re: Interesting game
Nov 14, 2008, 12:45 PM
"normally "- casual/usual
#189
teeth

day shift or night shift which is cool to work
#190
compassionate- kindhearted
#191
Polling Station / Re: Ur dream company
Nov 14, 2008, 12:36 PM
hi acumens,

is anybody there to share with me about ur dream company...

im waiting for u.

thanks in advance.
#192
Chat Box / Re: Word Association Game
Nov 14, 2008, 12:29 PM
life is short & sweet so enjoy it
#193
HI ACUMENS,

NO we dont want to finalize & lock this topic.

V R BACK...

can anyone tell the meaning of soombal.........[this is a tamil word]
#194
PEACEFUL LIFE-HOME/CHENNAI
#195
Chat Box / Re: BE PROUD TO BE AN INDIAN
Nov 14, 2008, 12:20 PM
"IM TOO PROUD TO BE AN INDIAN"
In India, Children's Day is celebrated on November 14. This date marks the birth anniversary of independent India's first Prime Minister, Pandit Jawaharlal Nehru as he was very fond of children.

so im proud to say that im INDIAN.

"HAPPY CHILDREN'S DAY"
#196
Chat Box / Re: Find As Many As Possible
Nov 14, 2008, 12:13 PM
metropolitan city - CHENNAI
#197
Chat Box / Re: Quiz: Compliance
Nov 14, 2008, 12:08 PM
Quiz: Test your regulatory compliance smarts

Are you up on regulatory compliance? Test your knowledge with these regulations and see if you can match up each regulationin the top with the correct requirements in the bottom of the page.

a. Outlines criteria for accepting electronic records and signatures and for documenting and validating authorized change processes to systems and software involved in the creation of electronic documents

b. Assures privacy of customer data for financial institutions

c. Requires that where patient data is recorded, stored or transmitted there must be a record of the change and patient's signature

d. Establishes controls and procedures for electronic securities transactions

e. Provides direction for managing capital risk, supervisory interaction, and publish risk disclosure for large banks

f. Provides guidelines for corporate governance and oversight of accounting and audit practices as well as financial record retention

g. Regulates firms providing IT products and services to the U.S. government


1. HIPAA   
2. FDA21 CFR 11   
3. SEC17 CFR 240   
4. Sarbanes-Oxley   
5. Basel II   
6. Gramm-Leach-Bliley   
7. Clinger-Cohen Act   
#198
Chat Box / Re: Quiz: Compliance
Nov 14, 2008, 12:05 PM
Compliance II: The letter of the law

Do you speak geek: Respecting the letter of the law

1.) What governing body oversees and enforces HIPAA compliance?
Answer

2.) Which constitutional amendment have you violated if evidence seized by your organization's honeynet has been declared inadmissible in a criminal trial?
Answer

3.) The Gramm-Leach-Bliley Act consists of three sections. What section stipulates that financial institutions must implement security programs to protect financial information?
Answer

4.) What is another name for the Financial Modernization Act of 1999?
Answer

5.) What law stipulates that if there's a security breach of a database containing personal data, the responsible organization must notify each resident for whom it maintained information?
Answer

6.) What loosely-defined law was originally conceived to prosecute hackers and spammers?
Answer

7.) What law establishes benchmarks used to measure compliance?
Answer

8.) What statute allows consumers to find out how their personal information was compromised and for what purpose, thereby requiring companies to provide details of a security breach?
Answer

9.) What law consists of two sections, of which IT practitioners are primarily concerned with Title II?
Answer

10.) What law allows courts to set damages of up to $2 million when senders of unsolicited bulk e-mail break the law?
Answer
#199
Chat Box / Quiz: Compliance
Nov 14, 2008, 12:04 PM
Quiz: Compliance


1. This job title describes a corporate official in charge of overseeing and managing compliance issues within an organization.
What is it?


2. This is legislation enacted in response to the high-profile Enron and WorldCom financial Removed to protect shareholders and the general public from accounting errors and fraudulent practices in the enterprise.
What is it?


3. This is legislation enacted in the United States that places restrictions on unsolicited bulk mail (UBE), such as requiring valid sender contact information and opt-out mechanisms.
What is it?


4. This is a state of accordance with established standards, specifications, or legislation.
What is it?


5. This is a U.S. government organization within the National Security Agency (NSA) that evaluates computing equipment for high security applications to ensure that facilities processing classified or other sensitive material are using trusted computer systems and components.
What is it?


6. This is legislation with two sections: Title I deals with protecting health insurance coverage for people who lose or change jobs; Title II includes an administrative simplification section which deals with the standardization of healthcare-related information systems (IT industry references are usually about HIPPA Title II).
What is it?


7. This is an organization that represents the music recording industry's intellectual property rights.
What is it?


8. This is legislation designed to stimulate competition that specifies: how local telephone carriers can compete; how and under what circumstances local exchange carriers (LEC) can provide long-distance services; and the deregulation of cable TV rates.
What is it?


9. This is a registry of phone numbers in the United States that telemarketers are prohibited from calling in most circumstances.
What is it?


10. This is an international organization made up of companies using or manufacturing DVD-related products.
What is it?
#200
Chat Box / Re: quiz:"Business Intelligence"
Nov 14, 2008, 12:03 PM
Quiz: Negotiating -- Do you speak business?

Find out how much you know about the language of negotiation.

1. This is a "you scratch my back and I'll scratch yours" approach to negotiation. What is it?
Answer

2. What is a Boulwarism?
a. a deal that takes forever to close
b. a non-negotiable offer
c. a conditional agreement
Answer

3. This is the negotiation of two or more products or services in a single package with one price. What is it?
Answer

4. This describes a critical point in a negotiation that causes a deal to fall through. It is the proverbial "straw that broke the camel's back." What is it?
Answer

5. What do you call an offer that is immediately accepted by the other party?
a. winner's curse
b. consensus gentium
c. smooth transaction
Answer

6. You just finished negotiating a deal for new printers when the salesperson "reminds" you that the agreed-upon purchase price does not include shipping. You thought that shipping was included in the price and seem to recall telling the salesperson that your company's policy is never to pay shipping as a separate cost. What should you do?
a. Accept that negotiations have been re-opened. Deal with it.
b.Walk away from the deal. They're trying to take advantage -- and if they do it once, they'll do it again.
Answer

7. True or false: When dealing with a vendor, think of him as your partner. The more information you can give him, the more he can help you.
Answer

8. When all is said and done, you didn't get everything that you wanted, but neither did the other side. Did you win?
Answer

9. True or false: Brilliant negotiators are patient. Sometimes all you have to do is wait till the other side gives in.
Answer

10. True or false: Always have a partner when negotiating -- it's not a good idea to go it alone.
Answer

#201
Chat Box / quiz:"Business Intelligence"
Nov 14, 2008, 12:00 PM
Quiz: Business Intelligence

1. This is an approach to selling goods and services in which a prospect explicitly agrees in advance to receive marketing information.
a. customer managed relationship
b. data mining
c. permission marketing
d. one-to-one marketing
e. batch processing

2. In an Internet context, this is the practice of tailoring Web pages to individual users' characteristics or preferences.
a. Web services
b. customer-facing
c. client/server
d. customer valuation
e. personalization

3. This is the processing of data about customers and their relationship with the enterprise in order to improve the enterprise's future sales and service and lower cost.
a. clickstream analysis
b. database marketing
c. customer relationship management
d. CRM analytics
e. B2C

4. This is a broad category of applications and technologies for gathering, storing, analyzing, and providing access to data to help enterprise users make better business decisions.
a. best practice
b. data mart
c. business information warehouse
d. business intelligence
e. business warehouse

5. This is a systematic approach to the gathering, consolidation, and processing of consumer data (both for customers and potential customers) that is maintained in a company's databases.
a. database marketing
b. marketing encyclopedia
c. application integration
d. service oriented integration
e. business technology management

6. This is an arrangement in which a company outsources some or all of its customer relationship management functions to an application service provider (ASP).
a. spend management
b. supplier relationship management
c. hosted CRM
d. Customer Information Control System
e. online transaction processing

7. This is an XML-based metalanguage developed by the Business Process Management Initiative (BPMI) as a means of modeling business processes, much as XML is, itself, a metalanguage with the ability to model enterprise data.
a. BizTalk
b. BPML
c. e-biz
d. ebXML
e. ECB

8. This is a central point in an enterprise from which all customer contacts are managed.
a. contact center
b. help system
c. multichannel marketing
d. call center
e. help desk

9. This is the practice of dividing a customer base into groups of individuals that are similar in specific ways relevant to marketing, such as age, gender, interests, spending habits, and so on.
a. customer service chat
b. customer managed relationship
c. customer life cycle
d. customer segmentation
e. change management

10. In data mining, this is a technique used to predict future behavior and anticipate the consequences of change.
a. predictive technology
b. disaster recovery
c. phase change
d. Digital Silhouettes
e. predictive modeling
#202
Chat Box / Re: quiz: "Messaging and E-Mail"
Nov 14, 2008, 11:52 AM
Quiz: Writing for business

1. Which one is correct?
a. The government approved a program that will give iPods to disadvantaged children.
b. The government approved a program which will give iPods to disadvantaged children.
Answer

2. Which one is correct?
a. Bacon and eggs are Bill Gates' favorite breakfast.
b. Bacon and eggs is Bill Gates' favorite breakfast.
Answer

3. Which one is correct?
The spyware infestation had a startling ________ on network performance.
a. affect
b. effect
Answer

4. Which one is correct?
Poor network performance ___________ everyone's work.
a. affected
b. effected
Answer

5. Which one is correct?
a. The next topic he addressed was the many instances of identity theft.
b. The next topic he addressed were the many instances of identity theft.
Answer

6. Which one is correct?
a. The recent divestiture, combined with rising costs, are expected to affect profits.
b. The recent divestiture, combined with rising costs, is expected to affect profits.
Answer

7. Which one is correct?
a. While answering the e-mail, the phone rang and interrupted me.
b. While answering the e-mail, I was interrupted by the phone ringing.
Answer

8. Which one is correct?
a. Unlike spam or spyware, spim is not under investigation by the federal government.
b. Unlike spam or spyware, the federal government is not investigating spim.
Answer

9. Which sentence is preferable?
a. "I'm not going to stand for it," Carly said.
b. "I'm not going to stand for it," fumed Carly.
Answer

10. Which sentence is preferable?
a. This issue was decided by the committee.
b. The committee decided this issue.
Answer


#203
Chat Box / Re: quiz: "Messaging and E-Mail"
Nov 14, 2008, 11:51 AM
Quiz: Spam, Spam and More Spam

1. A Russian gang of spammers are using SpamThru to engineer a tidal wave of junk mail across the globe. What classification of malware is SpamThru?
a. Trojan horse
b. click fraud
c. A & B

2. SpamThru hijacks unprotected PCs and turns them into spam relays. Another name for a spam relay is _______________________.
a. spambot
b. zombie
c. A & B

3. Spam relays work as kind of peer-to-peer network, all reporting to one central computer. The central computer is called a __________________.
a. controller
b. android
c. A & B

4. What is Spamhaus?
a. An Internet service provider that doesn't care if their members distribute spam.
b. An organization dedicated to stemming the distribution of spam
c. A & B

5. If a spammer gets caught, the individual may, as an act of revenge, sends out huge volumes of spam that appear to be from the person who reported him. What's this form of attack called?
a. distributed denial-of-service attack
b. Joe job
c. A & B

6. According to Vincent Weafer (Symantec), spambots are doing real-time ______ look-ups so their mailings aren't getting bounced as often.
a. ISP
b. DNS
c. A & B

7. This is a computer server that is set up to be intentionally slow as a trap for spammers using address harvesting programs.
a. teergrube
b. IP spoofer
c. A & B

8. True or false: Most spammers just want you to buy something.
Answer

9. To bypass email security systems that use optical character recognition, spammers use ________ in their messages.
a. image spam
b. spam cocktails
c. A & B

10. What technique describes the alteration of an e-mail header to make it look like the message came from just about anyone, including someone you might know?
a. munging
b. e-mail spoofing
#204
Chat Box / Re: quiz: "Messaging and E-Mail"
Nov 14, 2008, 11:50 AM
Exchange Geek-o-Meter

How do you measure up on our Exchange geek-o-meter?

1. Hot girl or viral worm?
This is a viral worm that uses the lore of a beautiful woman to infect Windows systems. When a user unwittingly opens an e-mail note with an attachment that appears to be a graphic image of a certain babe, the worm copies itself to the Windows directory and then sends the file as an attachment to all addresses in your address book.
What is it?

2. Hello operator?
This is Microsoft's trademarked directory service, an integral part of the Windows 2000 architecture. It is a centralized and standardized system that automates network management of user data, security, and distributed resources, and enables interoperation with other directories.
What is it?

3. It swings both ways
A programmer may sometimes install this so that the program can be accessed for troubleshooting or other purposes. However, attackers often use these that they detect or install themselves, as part of an exploit.
What is it?

4. Picking up the pieces
This is the process of locating the noncontiguous fragments of data into which a computer file may be divided as it is stored on a hard disk, and rearranging the fragments and restoring them into fewer fragments or into the whole file.
What is it?

5. It's hunting season!
This was the first computer virus known to have spread in the wild. Richard Skrenta, then fifteen years old, wrote the virus for the Apple II operating system, which was stored on floppy diskettes.
What is it?

6. "Oh Gee, oh shucks..."
This e-mail service gives you plenty of storage, but also parses users' messages to determine advertising matches and will occasionally insert appropriate ads in e-mail messages.
What is it?

7. Unknowing accomplice
This is an SMTP e-mail server that allows third-party relay of e-mail messages. By processing mail that is neither for nor from a local user, this makes it possible for an unscrupulous sender to route large volumes of spam.
What is it?

8. Don't e-mail without it
This is a Microsoft Windows program interface that enables you to send e-mail from within a Windows application and attach the document you are working on to the e-mail note.
What is it?

9. IM spam
According to a report from Ferris Research, 500 million IM spam messages were sent in 2003, twice the level of 2002. As it becomes more prevalent, it could impact the business community similarly to the way that spam e-mail does now, by consuming corporate resources and creating security problems. Think you know the term for IM spam?
What is it?

10. Hello? Is anyone there?
This is a term used for a set of facilities for managing the delivery of voice information using the Internet Protocol. In general, this means sending voice information in digital form in discrete packets rather than in the traditional circuit-committed protocols of the public switched telephone network.
What is it?
#205
Chat Box / Re: quiz: "Messaging and E-Mail"
Nov 14, 2008, 11:48 AM
quiz:Email Security

1. What is a secure method of sending e-mail that uses the RSA encryption system?
Answer

2. What is e-mail that has been directed to a recipient through a third-party server that does not identify the originator of the message?
Answer

3. What do you call a program used to detect unsolicited and unwanted e-mail and prevents those messages from getting to a user's inbox?
Answer

4. What is the name for Microsoft's proposed e-mail sender authentication protocol designed to protect against domain spoofing and phishing exploits?
Answer

5. What document must end-users agree to follow in order to be provided with access to a network and its applications, including e-mail?
Answer

6. What type of scam involves the sending of legitimate-looking e-mails appearing to come from some of the Web's biggest sites in an effort to gather personal and financial information from the recipient?
Answer

7. What is the term for an attempt to determine the valid e-mail addresses associated with an e-mail server so that they can be added to a spam database?
Answer

8. What protocol ensures privacy between communicating applications and their users on the Internet?
Answer

9. What term describes the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source?
Answer

10. What is the name for a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document?
#206
Chat Box / quiz: "Messaging and E-Mail"
Nov 14, 2008, 11:46 AM
Email marketing quiz

Take the quiz:

1. This is a technique used by legitimate marketers to customize email offerings for specific customers.

Read the answer about marketing technique

2. Used by spammers to make recipients think an email message came from someone other than them, this technique might convince a user that a spam email came from someone they'd actually like to hear from.

Read the answer on spam email

3. This is the term for an email message returned to the sender by the recipient's server as undeliverable, often because the email is -- rightly or wrongly -- determined to be spam.

Read the answer on returned emails

4. A type of Web-based marketing, this type of email allows recipients to buy goods and services directly from an email message, without being redirected to the retailer's Web site.

Read the answer on email purchases

5. This self-explanatory term is a more formal way of saying "spam."

Read the answer on spam email

6. This is a term for the number of times that users click on links in a message or on a Web site -- it's much higher for legitimate marketing emails than for spam.

Read the answer on email links

7. This is a program used to detect unwanted messages. A frequent problem is that they may also prevent delivery of some legitimate email marketing messages.

Read the answer on email programs

8. In this type of email campaign, advertisements are sent to targeted groups of customers.

Read the answer on email campaigns

9. Also known as permission-based email, this is one proposed requirement for marketers that could greatly decrease the amount of spam.

Read the answer on permission-based emails

10. Never used by legitimate marketers, this is a type of program that a spammer uses to troll the Internet seeking email addresses.
#207
Chat Box / Re: HAPPY CHILDRENS DAY
Nov 14, 2008, 11:36 AM


HAPPY Children's Day 2008
#208
Gift / Prizes Request / Top up Request
Nov 13, 2008, 08:54 PM
User Name : manimarank
Date  : 13 nov 08
Status : normal
Postcount : 84
Information : airtel prepaid inside TN
Total No of Post you made so far : Ex 674 posts : 741
Type of the Gift : Mobile Topup
Select Your Service Provider : Airtel Prepaid

Here by i declare that , before sending this request. I have verified my todays post. So Please check the topup status and confirm it.
[blink]Note : You will be given Warning if you are trying to test this Form or Found Fake[/blink]
#209
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 08:23 PM
quiz:Do you speak 'router' geek? ANSWERS

ANSWER FOR 10

TACACS (Terminal Access Controller Access Control System) is an older authentication protocol common to Unix networks that allows a remote access server to forward a user's logon password to an authentication server to determine whether access can be allowed to a given system. TACACS is an encryption protocol and therefore less secure than the later TACACS+ and Remote Authentication Dial-In User Service protocols. A later version of TACACS is XTACACS (Extended TACACS). Both are described in Request for Comments 1492.

In spite of its name, TACACS+ is an entirely new protocol. TACACS+ and RADIUS have generally replaced the earlier protocols in more recently built or updated networks. TACACS+ uses the Transmission Control Protocol (TCP) and RADIUS uses the User Datagram Protocol (UDP). Some administrators recommend using TACACS+ because TCP is seen as a more reliable protocol. Whereas RADIUS combines authentication and authorization in a user profile, TACACS+ separates the two operations.

TACACS and XTACACS are still running on many older systems.
#210
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 08:22 PM
quiz:Do you speak 'router' geek? ANSWERS

ANSWER FOR 9

An access control list (ACL) is a table that tells a computer operating system which access rights each user has to a particular system object, such as a file directory or individual file. Each object has a security attribute that identifies its access control list. The list has an entry for each system user with access privileges. The most common privileges include the ability to read a file (or all the files in a directory), to write to the file or files, and to execute the file (if it is an executable file, or program). Microsoft Windows NT/2000, Novell's NetWare, Digital's OpenVMS, and Unix-based systems are among the operating systems that use access control lists. The list is implemented differently by each operating system.

In Windows NT/2000, an access control list (ACL) is associated with each system object. Each ACL has one or more access control entries (ACEs) consisting of the name of a user or group of users. The user can also be a role name, such as "programmer," or "tester." For each of these users, groups, or roles, the access privileges are stated in a string of bits called an access mask. Generally, the system administrator or the object owner creates the access control list for an object.
#211
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 08:21 PM
quiz:Do you speak 'router' geek? ANSWERS

ANSWER FOR 8

In a telecommunications network, a switch is a device that channels incoming data from any of multiple input ports to the specific output port that will take the data toward its intended destination. In the traditional circuit-switched telephone network, one or more switches are used to set up a dedicated though temporary connection or circuit for an exchange between two or more parties. On an Ethernet local area network (LAN), a switch determines from the physical device (Media Access Control or MAC) address in each incoming message frame which output port to forward it to and out of. In a wide area packet-switched network such as the Internet, a switch determines from the IP address in each packet which output port to use for the next part of its trip to the intended destination.

In the Open Systems Interconnection (OSI) communications model, a switch performs the layer 2 or Data-Link layer function. That is, it simply looks at each packet or data unit and determines from a physical address (the "MAC address") which device a data unit is intended for and switches it out toward that device. However, in wide area networks such as the Internet, the destination address requires a look-up in a routing table by a device known as a router. Some newer switches also perform routing functions (layer 3 or the Network layer functions in OSI) and are sometimes called IP switches.

On larger networks, the trip from one switch point to another in the network is called a hop. The time a switch takes to figure out where to forward a data unit is called its latency. The price paid for having the flexibility that switches provide in a network is this latency. Switches are found at the backbone and gateway levels of a network where one network connects with another and at the subnetwork level where data is being forwarded close to its destination or origin. The former are often known as core switches and the latter as desktop switches.

In the simplest networks, a switch is not required for messages that are sent and received within the network. For example, a local area network may be organized in a Token Ring or bus arrangement in which each possible destination inspects each message and reads any message with its address.
Circuit-Switching version Packet-Switching
A network's paths can be used exclusively for a certain duration by two or more parties and then switched for use to another set of parties. This type of "switching" is known as circuit-switching and is really a dedicated and continuously connected path for its duration. Today, an ordinary voice phone call generally uses circuit-switching.

Most data today is sent, using digital signals, over networks that use packet-switching. Using packet-switching, all network users can share the same paths at the same time and the particular route a data unit travels can be varied as conditions change. In packet-switching, a message is divided into packets, which are units of a certain number of bytes. The network addresses of the sender and of the destination are added to the packet. Each network point looks at the packet to see where to send it next. Packets in the same message may travel different routes and may not arrive in the same order that they were sent. At the destination, the packets in a message are collected and reassembled into the original message.
#212
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 08:20 PM
quiz:Do you speak 'router' geek? ANSWERS

ANSWER FOR 7

Cisco Certified Internetwork Expert (CCIE) is what Cisco describes as its "premium networking certification." The CCIE is widely regarded as having one of the toughest, most demanding exams. It includes both a written exam and a day-long lab exam. This certification is aimed at senior level networking professionals who design, build, implement, maintain, or troubleshoot complex enterprise networking infrastructures. CCIE recipients can specialize in routing and switching, communications and services, security, or voice systems and technologies.
#213
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 08:19 PM
quiz:Do you speak 'router' geek? ANSWERS

ANSWER FOR 6

Hot Standby Router Protocol (HSRP) is a routing protocol that allows host computers on the Internet to use multiple routers that act as a single virtual router, maintaining connectivity even if the first hop router fails, because other routers are on "hot standby" - ready to go. Configured on Cisco routers running the Internet Protocol (IP) over Ethernet, Fiber Distributed-Data Interface (FDDI), and Token Ring local area networks (LANs), HSRP provides automatic router backup. The protocol is fully compatible with Novell's Internetwork Packet Exchange (IPX), AppleTalk, and Banyan VINES, and (in some configurations) with Xerox Network Systems (XNS) and DECnet.

Developed by Cisco and specified in IETF Request for Comments (RFC) 2281, HSRP ensures that only a single router (called the active router) is forwarding packets on behalf of the virtual router at any given time. A standby router is chosen to be ready to become the active router, in the event that the current active router fails. HSRP defines a mechanism used to determine active and standby routers by referring to their IP addresses. Once these are determined, the failure of an active router will not cause any significant interruption of connectivity.

On any given LAN, there may be multiple, possibly overlapping, hot standby groups, each with a single Media Access Control (Mac) address and IP address; the IP address should belong to the primary subnet, but must be different from any actual or virtual addresses allocated to any routers or hosts on the network.
#214
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 08:19 PM
quiz:Do you speak 'router' geek? ANSWERS

ANSWER FOR 5

A core router is a router that forwards packets to computer hosts within a network (but not between networks). A core router is sometimes contrasted with an edge router, which routes packets between a self-contained network and other outside networks along a network backbone.
#215
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 08:16 PM
quiz:Do you speak 'router' geek? ANSWERS

ANSWER FOR 4

An mrouter, or multicast router, is a router program that distinguishes between multicast and unicast packets and determines how they should be distributed along the Multicast Internet (sometimes known as the Multicast Backbone or MBone). Using an appropriate algorithm, an mrouter tells a switching device what to do with the multicast packet.

Mrouters currently make up "islands" on the MBone separated by unicast routers. Thus, an mrouter can disguise multicast packets so that they can cross unicast routers. This is done by making each multicast packet look like a unicast packet; the destination address is the next mrouter. This process is called IP tunneling.

There are two multicast routing protocols that mrouters use to distribute multicast packets. They are dense-mode routing and sparse-mode routing. The protocol used is determined by available bandwidth and the distribution of end users over the network. If the network has many end users and there is enough bandwidth, dense-mode routing is used. However, if bandwidth is limited and users are thinly distributed, sparse-mode routing is used.
#216
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 08:15 PM
quiz:Do you speak 'router' geek? ANSWERS

ANSWER FOR 3

A term used in asynchronous transfer mode (ATM) networks, an edge router is a device that routes data packets between one or more local area networks (LANs) and an ATM backbone network, whether a campus network or a wide area network (WAN). An edge router is an example of an edge device and is sometimes referred to as a boundary router. An edge router is sometimes contrasted with a core router, which forwards packets to computer hosts within a network (but not between networks).
#217
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 08:14 PM
quiz:Do you speak 'router' geek? ANSWERS

ANSWER FOR 2

Layer 3 refers to the Network layer of the commonly-referenced multilayered communication model, Open Systems Interconnection (OSI). The Network layer is concerned with knowing the address of the neighboring nodes in the network, selecting routes and quality of service, and recognizing and forwarding to the Transport layer incoming messages for local host domains.

A router is a layer 3 device, although some newer switches also perform layer 3 functions. The Internet Protocol (IP) address is a layer 3 address.
#218
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 08:13 PM
quiz:Do you speak 'router' geek? ANSWERS

ANSWER FOR 1

A brouter (pronounced BRAU-tuhr or sometimes BEE-rau-tuhr) is a network bridge and a router combined in a single product. A bridge is a device that connects one local area network (LAN) to another local area network that uses the same protocol (for example, Ethernet or Token Ring). If a data unit on one LAN is intended for a destination on an interconnected LAN, the bridge forwards the data unit to that LAN; otherwise, it passes it along on the same LAN. A bridge usually offers only one path to a given interconnected LAN. A router connects a network to one or more other networks that are usually part of a wide area network (WAN) and may offer a number of paths out to destinations on those networks. A router therefore needs to have more information than a bridge about the interconnected networks. It consults a routing table for this information. Since a given outgoing data unit or packet from a computer may be intended for an address on the local network, on an interconnected LAN, or the wide area network, it makes sense to have a single unit that examines all data units and forwards them appropriately.
#219
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 07:48 PM
Quiz: Recycling electronic equipment

ANSWER FOR 10

In computer and telephone use, chucking is the process of discarding a small piece of hardware by violent means, such as hurling it out a window, against a wall, or into a body of water. The term can also apply to devices tossed into active fireplaces, camp fires, or brush fires. Any type of hardware can be chucked, but this solution is employed most often in cases where a cell phone user, disgusted with poor performance or inadequate coverage, comes for a brief moment to the conclusion that the device is the bane of life. A person who chucks a piece of hardware is called a chucker.

Chucking can be an expensive practice if it becomes habitual. A few vendors will honor the warranty of a chucked item if the warranty is still in force, but such benevolence is rare. A word of warning for chuckers: some cell phone batteries contain hazardous materials that require special treatment when disposed of, and some components can explode if incinerated.
#220
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 07:47 PM
Quiz: Recycling electronic equipment

ANSWER FOR 9

Computer forensics, also called cyberforensics, is the application of computer investigation and analysis techniques to gather evidence suitable for presentation in a court of law. The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computer and who was responsible for it.

Forensic investigators typically follow a standard set of procedures: After physically isolating the computer in question to make sure it cannot be accidentally contaminated, investigators make a digital copy of the hard drive. Once the original hard drive has been copied, it is locked in a safe or other secure storage facility to maintain its pristine condition. All investigation is done on the digital copy.

Investigators use a variety of techniques and proprietary forensic applications to examine the hard drive copy, searching hidden folders and unallocated disk space for copies of deleted, encrypted, or damaged files. Any evidence found on the digital copy is carefully documented in a "finding report" and verified with the original in preparation for legal proceedings that involve discovery, depositions, or actual litigation.

Computer forensics has become its own area of scientific expertise, with accompanying coursework and certification.
#221
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 07:46 PM
Quiz: Recycling electronic equipment

ANSWER FOR 8

Dumpster diving is looking for treasure in someone else's trash. (A dumpster is a large trash container.) In the world of information technology, dumpster diving is a technique used to retrieve information that could be used to carry out an attack on a computer network. Dumpster diving isn't limited to searching through the trash for obvious treasures like access codes or passwords written down on sticky notes. Seemingly innocent information like a phone list, calendar, or organizational chart can be used to assist an attacker using social engineering techniques to gain access to the network. To prevent dumpster divers from learning anything valuable from your trash, experts recommend that your company establish a disposal policy where all paper, including print-outs, is shredded in a cross-cut shredder before being recycled, all storage media is erased, and all staff is educated about the danger of untracked trash.
#222
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 07:45 PM
Quiz: Recycling electronic equipment

ANSWER FOR 7

refurbish

Refurbish, in everyday language, is "to renew or to restore to a new condition and/or appearance". In the computer world, refurbished equipment is not necessarily defective in any way; it may just be "old" (a relative term in the world of computers). When hardware is refurbished, the components are examined and non-working parts are replaced.

Companies that lease computers may use refurbishing as a means of dealing with units that are returning from long-term leases; after the computers are refurbished, they may be sold at a reduced price or donated to charity - either of which is good for business. Corporations may buy refurbished computers and hardware for a number of reasons. Refurbished hardware costs less than new hardware, which makes it possible for small businesses to make the move to computerized operations for the first time or for businesses with limited means to buy higher quality computers for less money. Another reason for a corporation to buy refurbished equipment is to maintain corporate standards by ensuring that all employees have the same equipment, even when the model being used is not being sold any longer.

There are additional reasons for choosing refurbished hardware if a company is already computerized. For example, there may be a corporate plan to use desktop computers for three years before upgrading to newer ones. In the latter part of the three-year period, equipment purchases may be needed for new staff or to replace a component that no longer works. Since the corporation intends to replace all desktop computers in the near future, the purchasing department may not want to pay full price for any new equipment at the end of this three-year period. Refurbished computers provide a cost-effective alternative.

A number of organizations, such as StRUT (Students Recycling Used Technology), the National Cristina Foundation, and the Resource Area for Teachers (RAFT) collect and refurbish donated computer equipment for redistribution to schools and charities around the world.

#223
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 07:44 PM
Quiz: Recycling electronic equipment

ANSWER FOR 5

E-waste is any refuse created by discarded electronic devices and components as well as substances involved in their manufacture or use. The disposal of electronics is a growing problem because electronic equipment frequently contains hazardous substances. In a personal computer, for example, there may be lead in the cathode ray tube (CRT) and soldering compound, mercury in switches and housing, and cobalt in steel components, among other equally toxic substances. According to the Environmental Protection Agency (EPA), more than four million tons of e-waste go to U.S. landfills each year.

Around the world, a number of initiatives have arisen to address the issue of e-waste, by promoting the reuse of electronic devices (e-cycling) and mandating that safer alternatives to hazardous substances be used in their manufacture whenever possible. In Europe, legislation has been drafted to deal with the problem, including the Waste from Electrical and Electronic Equipment (WEEE) Directive and the Basel Convention. In the United States, initiatives have mostly come from the private sector, such as eBay's Rethink project.
#224
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 07:41 PM
Quiz: Recycling electronic equipment

ANSWER FOR 4

A hard drive shredder is a mechanical device that physically destroys old hard drives in such a way that the data they contain cannot be recovered. At a minimum, this involves severing every track on every platter in a drive.

The data bits on a hard drive are not destroyed by formatting, or even by overwriting several times with other data. Specialized programs called hard drive shredding utilities overwrite data many times with "gibberish," but some engineers claim that the original data may be recoverable by a determined expert even after this process unless overwriting has taken place hundreds of times. Drilling holes in an old hard drive will not necessarily work, because some tracks are likely to remain unsevered unless hundreds of holes are drilled.

The most effective way to ensure complete data destruction on a defunct hard drive is to pulverize the assembly, in much the same way as a wood chipper disposes of tree limbs and brush. Environmental precautions must be taken when this is done, because the resulting particles can be toxic. Several companies offer hard drive shredding services for a fee, including secure pickup and transport, compliance with environmental regulations, and certification of data destruction. For the enterprise concerned about data theft, such a vendor may offer the best solution to the data destruction problem.
#225
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 07:39 PM
Quiz: Recycling electronic equipment

ANSWER FOR 3

1) A format (noun, pronounced FOHR-mat) is a preestablished layout for data. A computer program accepts data as input in a certain format, processes it, and provides it as output in the same or another format. All data is stored in some format with the expectation that it will be processed by a program that knows how to handle that format. Generically, data formats tend to fall into bitmaps (strings of 0s and 1s) that describe images or sound patterns (or both), text formats (in which usually each byte value is mapped to a character), and numeric data formats (used by spreadsheet and other database programs).

A hard disk or other storage device is also said to be formatted when its space has been organized and divided into pieces that can be controlled for convenient storage and access. For example, a hard disk may be formatted into areas called sectors, tracks, and clusters.

2) To format (verb) a document or file for printing or displaying is to add the necessary information to it so that the output device will know how to present the output.

3) To format (verb) a hard disk or diskette is to set up the space divisions on the medium and initiate a space allocation table that will know exactly how to reach each bit of data that may be stored there later.
#226
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 07:38 PM
Quiz: Recycling electronic equipment

ANSWER FOR 2

In e-cycling, a hard drive overwriter is a program or utility that repeatedly overwrites the data on a computer's hard drive with gibberish. Once data is saved to a hard drive, it's surprisingly persistent. Simply deleting files makes them more difficult to access, but doesn't actually get rid of them. The data remains in the hard drive until it is overwritten. By overwriting the entire hard drive with gibberish, the user ensures that their information remains inaccessible no matter where the computer might eventually wind up. There are a number of products that overwrite hard drive data, including Norton's WipeInfo, OnTrack's DataEraser and Jetico's BCWipe.
#227
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 07:37 PM
Quiz: Recycling electronic equipment

ANSWER FOR 1

E-cycling is the practice of reusing, or distributing for reuse, electronic equipment and components rather than discarding them at the end of their life cycle. According to Gartner Group research, over four million computers will be replaced, worldwide, between 2004 and 2006.

Discarded electronics and electronic components (e-waste) are creating a serious problem because of toxic elements involved in their manufacture. In the vast majority of cases, discarded computers and other electronic devices, such as cell phones, are functional and could be passed on to another individual or organization. Often, even non-functioning devices can be refurbished and resold or donated. Organizations such as StRUT (Students Recycling Used Technology), the National Cristina Foundation, and the Resource Area for Teachers (RAFT) collect and refurbish donated computer equipment for redistribution to schools and charities around the world.

A number of initiatives, such as eBay's Rethink project, have arisen to promote e-cycling. Dell, IBM, Intel, and Hewlett-Packard are among the members of Rethink.
#228
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 07:29 PM
Quiz: Printers and printing ANSWERS

ANSWER FOR 10

spool

To spool (which stands for "simultaneous peripheral operations online") a computer document or task list (or "job") is to read it in and store it, usually on a hard disk or larger storage medium so that it can be printed or otherwise processed at a more convenient time (for example, when a printer is finished printing its current document). One can envision spooling as reeling a document or task list onto a spool of thread so that it can be unreeled at a more convenient time.

The idea of spooling originated in early computer days when input was read in on punched cards for immediate printing (or processing and then immediately printing of the results). Since the computer operates at a much faster rate than input/output devices such as printers, it was more effective to store the read-in lines on a magnetic disk until they could be conveniently printed when the printer was free and the computer was less busy working on other tasks. Actually, a printer has a buffer but frequently the buffer isn't large enough to hold the entire document, requiring multiple I/O operations with the printer.

The spooling of documents for printing and batch job requests still goes on in mainframe computers where many users share a pool of resources. On personal computers, your print jobs (for example, a Web page you want to print) are spooled to an output file on hard disk if your printer is already printing another file.
#229
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 07:28 PM
Quiz: Printers and printing ANSWERS

ANSWER FOR 9

reprographics

Reprographics is a blanket term encompassing multiple methods of reproducing content, such as scanning , photography, xerography and digital printing. The term applies to both physical ( hard copy ) and digital ( soft copy ) reproductions of documents and images.
#230
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 07:28 PM
Quiz: Printers and printing ANSWERS

ANSWER FOR 8

WYSIWYG

A WYSIWYG (pronounced "wiz-ee-wig") editor or program is one that allows a developer to see what the end result will look like while the interface or document is being created. WYSIWYG is an acronym for "what you see is what you get". A WYSIWYG editor can be contrasted with more traditional editors that require the developer to enter descriptive codes (or markup ) and do not permit an immediate way to see the results of the markup. The first true WYSIWYG editor was a word processing program called Bravo. Invented by Charles Simonyi at the Xerox Palo Alto Research Center in the 1970s, it became the basis for Simonyi's work at Microsoft and evolved into two other WYSIWYG applications called Word and Excel .

An HTML WYSIWYG editor, such as Microsoft's FrontPage or Adobe's PageMill conceals the markup and allows the Web page developer to think entirely in terms of how the content should appear. One of the trade-offs, however, is that an HTML WYSIWYG editor sometimes inserts the markup code it thinks is needed all on its own. Then, the developer has to know enough about the markup language to go back into the source code and clean it up.
#231
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 07:27 PM
Quiz: Printers and printing ANSWERS

ANSWER FOR 7

screen printing

Screen printing, also known as serigraphy, is a method of creating an image on paper, fabric or some other object by pressing ink through a screen with areas blocked off by a stencil. The technique is used both for making fine art prints and for commercial applications, such as printing a company's logo on coffee mugs or t-shirts.
#232
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 07:27 PM
Quiz: Printers and printing ANSWERS

ANSWER FOR 6

laser printer

A laser printer is a popular type of personal computer printer that uses a non-impact (keys don't strike the paper), photocopier technology. When a document is sent to the printer, a laser beam "draws" the document on a selenium-coated drum using electrical charges. After the drum is charged, it is rolled in toner, a dry powder type of ink. The toner adheres to the charged image on the drum. The toner is transferred onto a piece of paper and fused to the paper with heat and pressure. After the document is printed, the electrical charge is removed from the drum and the excess toner is collected. Most laser printers print only in monochrome. A color laser printer is up to 10 times more expensive than a monochrome laser printer.

IBM introduced the first laser printer in 1975 for use with its mainframe computers. In 1984, Hewlett-Packard revolutionized laser-printing technology with its first LaserJet, a compact, fast, and reliable printer that personal computer users could afford. Since then, laser printers have decreased further in price and increased in quality. Hewlett Packard continues to be the leading manufacturer with competitors including Lexmark, Okidata, and Xerox.

The laser printer is different from an inkjet printer in a number of ways. The toner or ink in a laser printer is dry. In an inkjet, it is wet. Over time, an inkjet printer is about ten times more expensive to operate than a laser printer because ink needs replenishing more frequently. The printed paper from an inkjet printer will smear if wet, but a laser-printed document will not. Both types of printer operate quietly and allow fonts to be added by using font cartridges or installing soft fonts. If your printing needs are minimal, an inkjet printer is sufficient. But if your printing volume is high, consider buying a laser printer.

When buying a laser printer, these are some important features to consider:

Print capacity and speed: Personal laser printers are sufficient for printing an average of 200 pages per week. These are low-end and cost $200 and up. They can print up to eight ppm (pages per minute). A workgroup printer is needed if an average of 1000 pages per week is needed. These print up to 24 ppm and cost $1000 to $6000 and more. Production printers are needed for printing 50,000 or more pages per week. These are quite expensive and are used by commercial publishers. They can print up to 700 ppm and cost $100,000 and up. They can print 24 hours a day, seven days a week.

Resolution: The standard resolution in most laser printers today is 600 dots-per-inch ( dpi ). This resolution is sufficient for normal everyday printing including small desktop publishing jobs. A high-end production printer might have a resolution of 2400 dpi. Some laser printers still use a resolution of 300 dpi. This resolution can cause jagged lines to appear on the outer edge of an image. Hewlett Packard created RET (Resolution Enhancement Technology) to correct this. RET inserts smaller dots at the edges of lines and to smooth the rough edges. RET does not improve the resolution, but the document looks better. If you purchase a printer with 300 dpi, make sure it has RET.

Printer languages: Printer Control Language ( PCL ) is the standard printer language for Hewlett Packard and most other laser printers (which are mostly HP-compatible). PCL is used for printing letters, database printouts, spreadsheets, and simple graphics. Postscript printers are used with desktop publishing software and drawing packages. Postscript printers are the norm for Apple Macintosh printers. A laser printer that comes with Postscript installed is more expensive. A laser printer that uses PCL can be upgraded to Postscript by installing a software driver provided by the manufacturer of the laser printer. The printer might require more memory when upgraded to use Postscript. This is because a laser printer needs the entire image in memory before printing, and a Postscript printer requires more memory to process than a PCL printer does. The application being used must support Postscript in order for the laser printer to print Postscript documents.

Paper handling: Paper handling is important when shopping for a laser printer. Most laser printers use letter-size, cut-sheet paper. High-end production printers use continuous sheet paper. Laser printers can print on transparencies, adhesive labels, and lightweight cards. A laser printer with duplex printing can print on one side of the paper, turn the paper over, and print on the other side. Most laser printers, however, use simple printing with manual duplex printing. Manual duplex printing is achieved by changing the print options in the printer's properties or printing one side and taking that same paper and reinserting it into the printer to print on the other side.

FPOT and warm-up time: A final consideration in purchasing a printer is FPOT (first paper out time) and warm-up time. When a laser printer receives data from the computer to print, it takes 5 to 30 seconds to prepare the printer to print a new job. This is in addition to the time it takes to actually print the document. The warm-up time is as important. When the printer is turned on, it needs time to warm up the fuser to operating temperature. If the printer has a standby mode or is turned off between printing jobs, the warm-up time becomes even more important. Large workgroup and production printers can take 5 to 15 minutes to warm up. This waiting period can hinder overall productivity.
#233
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 07:24 PM
Quiz: Printers and printing ANSWERS

ANSWER FOR 5

xerography

Xerography, also known as electrophotography, is a printing and photocopying technique that works on the basis of electrostatic charges. The xerography process is the dominant method of reproducing images and printing computer data and is used in photocopiers, laser printer s and fax machines. The term derives from the Greek words xeros , meaning dry and graphos , meaning writing.

Xerography was invented in the late 1930s by an American patent lawyer named Chester Carlson. At first, engineers considered the idea useless and several years passed before the potential of the invention was appreciated by industry. During those years, IBM, Kodak, General Electric and RCA were among the companies that turned Carlson away. The Battelle Memorial Institute, a nonprofit organization, invested in Carlson's research and eventually signed a licensing agreement with a company called Haloid. Battelle and Haloid collaborated in research and demonstrated the technique in 1948. Haloid subsequently became Xerox.

The original xerography process allowed for reproducing or printing only grayscale images. Later, the capability to reproduce and print color images was developed. High-end grayscale and color laser printers can provide hard copy nearly as good as that produced by an offset printer. Xerography may eventually supplant traditional printing for the production of books and magazines.
#234
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 07:23 PM
Quiz: Printers and printing ANSWERS

ANSWER FOR 4

dots per inch

1) In computers, dots per inch (dpi) is a measure of the sharpness (that is, the density of illuminated points) on a display screen . The dot pitch determines the absolute limit of the possible dots per inch. However, the displayed resolution of pixel s (picture elements) that is set up for the display is usually not as fine as the dot pitch. The dots per inch for a given picture resolution will differ based on the overall screen size since the same number of pixels are being spread out over a different space. Some users prefer the term "pixels per inch ( ppi )" as a measure of display image sharpness, reserving dpi for use with the print medium.

2) In printing, dots per inch (dpi) is the usual measure of printed image quality on the paper. The average personal computer printer today provides 300 dpi or 600 dpi. Choosing the higher print quality usually reduces the speed of printing each page.
#235
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 07:23 PM
Quiz: Printers and printing ANSWERS

ANSWER FOR 3

letterpress

Letterpress is the oldest form of printing. In this method, a surface with raised letters is inked and pressed to the surface of the printing substrate to reproduce an image in reverse. Typically, metal type has been used but other possibilites include carved wood or stone blocks.

After the Gutenberg press introduced movable type to the process in the 15th century, letterpress was the predominant printing method for 500 years. The creation of huge rotary presses made industrial printing and newspaper production practical.

By the 1950s, xerography and offset printing began to supplant letterpress and by the end of the 20th century, digital printing and related technologies had become the industry standard for many uses. Nevertheless, letterpress is still used for some specialized commercial applications. The old method is also enjoying a resurgence among modern-day enthusiasts who prize the hand-made qualities and historical nature of letterpress print.

#236
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 07:23 PM
Quiz: Printers and printing ANSWERS

ANSWER FOR 2

engraving

Engraving, in a printing context, is a method of creating raised areas of print or images on paper, such as a business card or letterhead. An impression is created on a metal plate, which is then filled with opaque ink. When paper is pressed into the plate, it creates raised and colored areas. A similar effect can be created by thermographic printing . Engraving and gravure are the two most common forms of intaglio printing.
#237
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 07:22 PM
Quiz: Printers and printing ANSWERS

ANSWER FOR 1

Postscript

Postscript is a programming language that describes the appearance of a printed page. It was developed by Adobe in 1985 and has become an industry standard for printing and imaging. All major printer manufacturers make printers that contain or can be loaded with Postscript software, which also runs on all major operating system platforms. A Postscript file can be identified by its ".ps" suffix.

Postscript describes the text and graphic elements on a page to a black-and-white or color printer or other output device, such as a slide recorder, imagesetter, or screen display. Postscript handles industry-standard, scalable typeface in the Type 1 and TrueType formats. Users can convert Postscript files to the Adobe Portable Document Format ( PDF ) using the Adobe Acrobat product. PDF files present the document's printed appearance on a display screen. (You'll find many PDF documents for downloading and viewing from Web sites; you'll need to download the Acrobat viewer as a plug-in .) Adobe sells a more sophisticated product called Supra for print-on-demand and production printing.

Note that the average home laser printer is not a Postscript printer; which is somewhat more expensive and more frequently purchased for business use. (However, they aren't that expensive and Postscript printers for home or small business use are worth considering.)
#238
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 07:18 PM
Quiz: Workstations ANSWER KEY

Answer Key: 1c; 2d; 3b; 4a; 5c; 6a; 7d; 8a; 9b; 10e
#239
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 07:16 PM
Quiz: Servers ANSWER KEY

ANSWER KEY: 1b;2d;3d;4d;5a;6e;7b;8e;9c;10c
#240
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 06:57 PM
Quiz: Networking Hardware ANSWER KEY

ANSWER KEY: 1s;2a;3o;4q;5e;6k;7c;8p;9j;10r
#241
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 06:52 PM
Quiz: Mainframe Acronym-o-phobia

BONUS question:

Everyone knows IBM stands for "International Business Machine" but what does the BMC in BMC Software come from?

    * A) Business Management and Control
    * B) Binding Mainframes and Commerce
    * C) Building Mainframe Control
    * D) None of the above -- BMC Software was named after its founders: Scott Boulett , John Moores and Dan Cloer.

scroll down for ANSWER























































THE ANSWER IS D.
#242
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 06:17 PM
Mainframe Acronym-o-phobia

ANSWER FOR 9

check System z Application Assist Processor (zAAP)
#243
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 06:15 PM
Mainframe Acronym-o-phobia

ANSWER FOR 8

Also see NetRexx, a language that combines ideas from Java and Rexx.

Rexx is an interpreted script language developed by IBM originally for use by personal users of large operating systems. It was designed for ease of learning and use and to make programming accessible to non-programmers. It offers powerful character-manipulation, automatic data typing, manipulation of words, numbers, and names, and debugging capabilities.

REXX can be compared with these interpreted script languages:

    * Visual Basic
    * Netscape's JavaScript
    * Sun Microsystem Tcl
    * Larry Wall's Perl

In general, script languages are easier and faster to code in than the more structured, compiled languages such as C and C++ and are ideal for programs of very limited capability or that can reuse and tie together existing compiled programs.
#244
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 06:14 PM
Mainframe Acronym-o-phobia

ANSWER FOR 7

MVS (Multiple Virtual Storage) is an operating system from IBM that continues to run on many of IBM's mainframe and large server computers. MVS has been said to be the operating system that keeps the world going and the same could be said of its successor systems, OS/390 and z/OS. The payroll, accounts receivable, transaction processing, database management, and other programs critical to the world's largest businesses are usually run on an MVS or successor system. Although MVS has often been seen as a monolithic, centrally-controlled information system, IBM has in recent years repositioned it (and successor systems) as a "large server" in a network-oriented distributed environment, using a 3-tier application model.

The follow-on version of MVS, OS/390, no longer included the "MVS" in its name. Since MVS represents a certain epoch and culture in the history of computing and since many older MVS systems still operate, the term "MVS" will probably continue to be used for some time. Since OS/390 also comes with Unix user and programming interfaces built in, it can be used as both an MVS system and a UNIX system at the same time. A more recent evolution of MVS is z/OS, an operating system for IBM's zSeries mainframes. MVS systems run older applications developed using COBOL and, for transaction programs, CICS. Older application programs written in PL/I and FORTRAN are still running. Older applications use the Virtual Storage Access Method access method for file management and Virtual Telecommunications Access Method for telecommunication with users. The most common program environment today uses the C and C++ languages. DB2 is IBM's primary relational database management system (RDBMS). Java applications can be developed and run under OS/390's UNIX environment.

MVS is a generic name for specific products that included MVS/SP (MVS/System Product), MVS/XA (MVS/Extended Architecture), and MVS/ESA (MVS/Enterprise Systems Architecture). Historically, MVS evolved from OS/360, the operating system for the System/360, which was released in 1964. It later became the OS/370 and the System/370. OS/370 evolved into the OS/VS, OS/MFT, OS/MVT, OS/MVS, MVS/SP, MVS/XA, MVS/ESA, and finally OS/390 and then z/OS. Throughout this evolution, application programs written for any operating system have always been able to run in any of the later operating systems. (This is called forward compatibility.)

An MVS system is a set of basic products and a set of optional products. This allows a customer to choose the set of functions they need and exclude the rest. In practice, most customers probably use almost all of the functions. The main user interface in MVS systems is TSO (Time Sharing Option). The Interactive System Productivity Facility (ISPF) is a set of menus for compiling and managing programs and for configuring the system. The main work management system is either Job Entry Subsystem 2 or 3 (JES2 or JES3). Storage (DASD) management is performed by DFSMS (Distributed File Storage Management Subsystem). MVS is considerably more complex and requires much more education and experience to operate than smaller server and personal computer operating systems.

The Virtual Storage in MVS refers to the use of virtual memory in the operating system. Virtual storage or memory allows a program to have access to the maximum amount of memory in a system even though this memory is actually being shared among more than one application program. The operating system translates the program's virtual address into the real physical memory address where the data is actually located. The Multiple in MVS indicates that a separate virtual memory is maintained for each of multiple task partitions.

Other IBM operating systems for their larger computers include or have included: the Transaction Processing Facility (TPF), used in some major airline reservation systems, and VM, an operating system designed to serve many interactive users at the same time.
#245
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 06:14 PM
Mainframe Acronym-o-phobia

ANSWER FOR 6

The number of MIPS (million instructions per second) is a general measure of computing performance and, by implication, the amount of work a larger computer can do. For large servers or mainframes, MIPS is a way to measure the cost of computing: the more MIPS delivered for the money, the better the value. Historically, the cost of computing measured in the number of MIPS has been reduced by half on an annual basis for a number of years.

The number of MIPS attributed to a computer is usually determined by one or more benchmark runs.
#246
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 06:13 PM
Mainframe Acronym-o-phobia

ANSWER FOR 5

RACF (Resource Access Control Facility) is the IBM security management product for its mainframe (large server) operating system, OS/390 (MVS) as well as for its VM operating system. RACF allows an enterprise to manage the biggest security threat in most enterprises: destruction of computing resources by its own employees. Since its first release in 1976, RACF has screened millions of mainframe users who are familiar with their logon identification as their "RACF userid.""

RACF gives access to a computer system only to users who have the authorization to use a requested resource (such as a file, a printer queue, space to run a program, and so forth). To do this, RACF identifies and authenticates a user, determines the resources to which the user is authorized, and logs and reports attempts to get access to protected resources by unauthorized users.

In OS/390, RACF is part of the Security Server.
#247
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 06:12 PM
Mainframe Acronym-o-phobia

ANSWER FOR 4

IMS (Information Management System) is a database and transaction management system that was first introduced by IBM in 1968. Since then, IMS has gone through many changes in adapting to new programming tools and environments. IMS is one of two major legacy database and transaction management subsystems from IBM that run on mainframe MVS (now z/OS) systems. The other is CICS. It is claimed that, historically, application programs that use either (or both) IMS or CICS services have handled and continue to handle most of the world's banking, insurance, and order entry transactions.

IMS consists of two major components, the IMS Database Management System (IMS DB) and the IMS Transaction Management System (IMS TM). In IMS DB, the data is organized into a hierarchy. The data in each level is dependent on the data in the next higher level. The data is arranged so that its integrity is ensured, and the storage and retrieval process is optimized. IMS TM controls I/O (input/output) processing, provides formatting, logging, and recovery of messages, maintains communications security, and oversees the scheduling and execution of programs. TM uses a messaging mechanism for queuing requests.

IMS's original programming interface was DL/1 (Data Language/1). Today, IMS applications and databases can be connected to CICS applications and DB2 databases. Java programs can access IMS databases and services.

IMS also stands for Intelligent Manufacturing Systems and IP Multimedia Subsystem.
#248
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 06:12 PM
Mainframe Acronym-o-phobia

ANSWER FOR 3

DASD, pronounced DAZ-dee (Direct access storage device), is a general term for magnetic disk storage devices. The term has historically been used in the mainframe and minicomputer (mid-range computer) environments and is sometimes used to refer to hard disk drives for personal computers. A redundant array of independent disks (RAID) is also a type of DASD.

The "direct access" means that all data can be accessed directly in about the same amount of time rather than having to progress sequentially through the data.
#249
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 06:10 PM
Mainframe Acronym-o-phobia

ANSWER FOR 2

CICS (Customer Information Control System) is an online transaction processing (OLTP) program from IBM that, together with the COBOL programming language, has formed over the past several decades the most common set of tools for building customer transaction applications in the world of large enterprise mainframe computing. A great number of the legacy applications still in use are COBOL/CICS applications. Using the application programming interface (API) provided by CICS, a programmer can write programs that communicate with online users and read from or write to customer and other records (orders, inventory figures, customer data, and so forth) in a database (usually referred to as "data sets") using CICS facilities rather than IBM's access methods directly. Like other transaction managers, CICS can ensure that transactions are completed and, if not, undo partly completed transactions so that the integrity of data records is maintained.

IBM markets or supports a CICS product for OS/390, Unix, and Intel PC operating systems. Some of IBM's customers use IBM's Transaction Server to handle e-business transactions from Internet users and forward these to a mainframe server that accesses an existing CICS order and inventory database
#250
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 06:04 PM
Mainframe Acronym-o-phobia

ANSWER FOR 1

EBCDIC (Extended Binary Coded Decimal Interchange Code ) (pronounced either "ehb-suh-dik" or "ehb-kuh-dik") is a binary code for alphabetic and numeric characters that IBM developed for its larger operating systems. It is the code for text files that is used in IBM's OS/390 operating system for its S/390 servers and that thousands of corporations use for their legacy applications and databases. In an EBCDIC file, each alphabetic or numeric character is represented with an 8-bit binary number (a string of eight 0's or 1's). 256 possible characters (letters of the alphabet, numerals, and special characters) are defined.

IBM's PC and workstation operating systems do not use IBM's proprietary EBCDIC. Instead, they use the industry standard code for text, ASCII. Conversion programs allow different operating systems to change a file from one code to another.
#251
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 06:02 PM
Quiz: Laptops

ANSWER KEY: 1d; 2c; 3a; 4e; 5b; 6e; 7a; 8d; 9b; 10e
#252
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 06:00 PM
Quiz: HP

ANSWER KEY: 1c; 2a; 3c; 4b; 5b; 6a; 7b; 8d; 9c; 10a
#253
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 05:50 PM
Quiz: Greening the cube farm

ANSWER FOR 10

refurbish

Refurbish, in everyday language, is "to renew or to restore to a new condition and/or appearance". In the computer world, refurbished equipment is not necessarily defective in any way; it may just be "old" (a relative term in the world of computers). When hardware is refurbished, the components are examined and non-working parts are replaced.

Companies that lease computers may use refurbishing as a means of dealing with units that are returning from long-term leases; after the computers are refurbished, they may be sold at a reduced price or donated to charity - either of which is good for business. Corporations may buy refurbished computers and hardware for a number of reasons. Refurbished hardware costs less than new hardware, which makes it possible for small businesses to make the move to computerized operations for the first time or for businesses with limited means to buy higher quality computers for less money. Another reason for a corporation to buy refurbished equipment is to maintain corporate standards by ensuring that all employees have the same equipment, even when the model being used is not being sold any longer.

There are additional reasons for choosing refurbished hardware if a company is already computerized. For example, there may be a corporate plan to use desktop computers for three years before upgrading to newer ones. In the latter part of the three-year period, equipment purchases may be needed for new staff or to replace a component that no longer works. Since the corporation intends to replace all desktop computers in the near future, the purchasing department may not want to pay full price for any new equipment at the end of this three-year period. Refurbished computers provide a cost-effective alternative.

A number of organizations, such as StRUT (Students Recycling Used Technology), the National Cristina Foundation, and the Resource Area for Teachers (RAFT) collect and refurbish donated computer equipment for redistribution to schools and charities around the world.
#254
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 05:50 PM
Quiz: Greening the cube farm

ANSWER FOR 9

A green data center is a repository for the storage, management, and dissemination of data in which the mechanical, lighting, electrical and computer systems are designed for maximum energy efficiency and minimum environmental impact. The construction and operation of a green data center includes advanced technologies and strategies. Here are some examples:

    * Minimizing the footprints of the buildings
    * The use of low-emission building materials, carpets and paints
    * Sustainable landscaping
    * Waste recycling
    * Installation of catalytic converters on backup generators
    * The use of alternative energy technologies such as photovoltaics, heat pumps, and evaporative cooling
    * The use of hybrid or electric company vehicles

Building and certifying a green data center or other facility can be expensive up front, but long-term cost savings can be realized on operations and maintenance. Another advantage is the fact that green facilities offer employees a healthy, comfortable work environment. In addition, green facilities enhance relations with local communities.

There is growing pressure from environmentalists and, increasingly, the general public for governments to offer green incentives: monetary support for the creation and maintenance of ecologically responsible technologies.
#255
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 05:48 PM
Quiz: Greening the cube farm

ANSWER FOR 8

heat

Heat is the transfer of kinetic energy from one medium or object to another, or from an energy source to a medium or object. Such energy transfer can occur in three ways: radiation, conduction, and convection.

The standard unit of heat in the International System of Units ( SI ) is the calorie (cal), which is the amount of energy transfer required to raise the temperature of one gram of pure liquid water by one degree Celsius, provided the water temperature is higher than the freezing point and lower than the boiling point. Sometimes the kilocalorie (kcal) is specified as a unit of heat; 1 kcal = 1000 cal. (This is the so-called diet calorie.) Less often, the British thermal unit ( Btu ) is used. This is the amount of heat required to raise the temperature of one pound of pure liquid water by one degree Fahrenheit.

An example of heat by radiation is the effect of infrared ( IR ) energy as it strikes a surface. IR is an electromagnetic field capable of transfering energy from a source, such as a fireplace, to a destination, such as the surfaces within a room. Radiation does not require an intervening medium; it can occur through a vacuum. It is responsible for the warming of the Earth by the sun.

Heat by conduction takes place when two material media or objects are in direct contact, and the temperature of one is higher than the temperature of the other. The temperatures tend to equalize; thus the heat conduction consists of a transfer of kinetic energy from the warmer medium to the cooler one. An example is the immersion of a chilled human body in a hot bath.

Heat by convection occurs when the motion of a liquid or gas carries energy from a warmer region to a cooler region. A good example of convection is the tendency of warm air to rise and cool air to fall, equalizing the air temperature inside a room containing a hot stove. Heat convection (along with conduction) is believed to take place inside the Earth, transfering kinetic energy from the inner core through the outer core and mantle to the crust. In this situation, the outer core and the mantle behave like liquids over long periods of time.
#256
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 05:47 PM
Quiz: Greening the cube farm

ANSWER FOR 7

screen saver

A screen saver is an animated image that is activated on a personal computer display when no user activity has been sensed for a certain time. The original purpose of a screen saver was to prevent burn-in (the burning of an image into the phosphor inside the cathode ray tube after hours of the same image being rescanned). In fact, today's CRT display technology makes burn-in unlikely except under extreme conditions. (On larger displays used for room presentations, burn-in is still a possibility.)

Windows comes with built-in screen savers that you can select. If you purchase your computer with the operating system already installed, a screen saver may have been selected for you. You can set the screen saver using the task bar by selecting Start, then Settings, then Control Panel, then Display, and then Screen Saver, which lets you select one of the provided screen savers or one you have added to the Windows screen saver directory. The Mac also lets you set up a screen saver.
#257
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 05:47 PM
Quiz: Greening the cube farm

ANSWER FOR 6

LCD (liquid crystal display) is the technology used for displays in notebook and other smaller computers. Like light-emitting diode (LED) and gas-plasma technologies, LCDs allow displays to be much thinner than cathode ray tube (CRT) technology. LCDs consume much less power than LED and gas-display displays because they work on the principle of blocking light rather than emitting it.

An LCD is made with either a passive matrix or an active matrix display display grid. The active matrix LCD is also known as a thin film transistor (TFT) display. The passive matrix LCD has a grid of conductors with pixels located at each intersection in the grid. A current is sent across two conductors on the grid to control the light for any pixel. An active matrix has a transistor located at each pixel intersection, requiring less current to control the luminance of a pixel. For this reason, the current in an active matrix display can be switched on and off more frequently, improving the screen refresh time (your mouse will appear to move more smoothly across the screen, for example).

Some passive matrix LCD's have dual scanning, meaning that they scan the grid twice with current in the same time that it took for one scan in the original technology. However, active matrix is still a superior technology.
#258
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 05:45 PM
Quiz: Greening the cube farm

ANSWER FOR 5

planned obsolescence

Planned obsolescence, also called built-in obsolescence, is the conception, design and production of a product, such as hardware or software , with the intent that it should be useful, functional or popular for a limited length of time. The term was coined in the 1950s by Brooks Stevens who suggested that new and improved products are in constant demand by consumers and that corporations can best respond by manufacturing items that don't last very long.

In the computer industry, planned obsolescence occurs in a synergistic manner between the hardware and software sectors. New application s and operating system s (OSs) demand more memory , hard disk space, storage capacity and throughput . This demand leads to the development of improved memory technology, increasingly capacious hard drives and storage media and faster microprocessor s. These developments, in turn, are followed by still more sophisticated applications and OSs, driving the cycle to continue. All of this is fueled by the geek 's love of gadgetry and an ongoing decline in the costs of raw materials and production processes.

Cynics decry planned obsolescence as a symptom of a "disposable society" and express nostalgia for the "good old days" when things were "built to last." Corporate executives counter with the claim that planned obsolescence is market-driven, taking place for no other purpose than to keep pace with the ever-changing needs and wants of consumers.
#259
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 05:43 PM
Quiz: Greening the cube farm

ANSWER FOR 4

Puppy Linux is a lightweight Linux distribution, one of several similar operating systems in a group called skinny Linux. Puppy Linux is most often run from a LiveCD or other removable media, which makes it easy to use on a computer that normally runs another operating system, such as Windows, without making any permanent changes to the system. This capacity, along with its compact size and ease of use, has made Puppy Linux a popular means of reviving old computers.

Puppy Linux has several advantages that allow it to function as a desktop replacement for users who want a fast, compact, relatively trouble-free OS. These include:

    * Relative immunity to problems with malware such as viruses and Trojans.
    * Compatibility with older computers that don't typically work with newer operating systems.
    * Presence in a RAM disk after boot-up.
    * An integrated browser with all the features of other popular Web browsers.
    * Ability to play CDs and DVDs on computers with only one CD/DVD drive.
    * Preinstallation of several popular applications.
    * Ability to generate a bootable USB jump drive version of itself.
    * A thin client that can be used with Microsoft Windows.
    * Ability to create a stateless client for use with other OSs.

Barry Kauler began the Puppy Linux initiative in January 2003. The open source community continues to develop the product.
#260
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 05:42 PM
Quiz: Greening the cube farm

ANSWER FOR 3

In computers, water cooling is a method used to lower the temperatures of computer processors, and sometimes other components such as graphics cards, using water rather than air as the cooling medium. Processor speeds have increased dramatically in recent years. As a result, the heat given off by processors has also increased, as has the noise associated with equipment, such as fans, used to keep them running at a safe temperature. Because water can conduct heat about 30 times faster than air can, a water cooling system allows the processor to run at higher speeds while drastically reducing system noise. Some industry experts predict that water cooling systems will become standard for personal computers in the near future.

Here's a simple example of a water cooling system: A pump circulates the water through a water block (a device similar to a heat sink) attached to the processor; there, heat from the processor transfers to the water. The heated water continues on to a radiator at the back of the computer case and is replaced with cool water. The heat from the water in the radiator dissipates into the air surrounding the computer. When the water has cooled to the ambient temperature, it is cycled through the system again.

Water cooling is increasingly used to deal with the special requirements of the data center. Because data centers are often assigned the most convenient available space, rather than a space that is specially designed, servers may be contained in too small an area or one that cannot be adequately ventilated. Furthermore, some data center technologies, such as blade servers (which are densely structured), put increased stress on the data center's cooling system.

Water cooling brings its own issues to the data center, however, as well as benefits. Additional plumbing is often required. Water cooling can limit the flexibility of data center design because systems connected to plumbing cannot be easily rearranged. The combination of electronic systems and water also complicates disaster recovery planning (DRP). For example, administrators need to know in advance how they will deal with potential problems, such as rust or leakage. A common fear of combining electrical systems and water is another road block to acceptance of water cooling.

Despite the inherent challenges, many industry experts predict that water cooling is the inescapable future of the data center. According to Robert E. McFarlane, president of the Interport Division of New York-based Shen, Milsom and Wilke Inc., "Paranoia is the reason there's so little water-cooled equipment on the market. We tend to get married to the technologies that we know and are comfortable with, but it's getting to that point where you just can't cool these densities without carrying it in liquid form."

Water cooling is nothing new -- automobiles and mainframe computers have used water cooling systems for many years. However, water cooling is being used in some new and innovative applications, such as environmentally friendly air conditioning systems for buildings.

Water cooling is sometimes referred to as liquid cooling, because various other substances are sometimes used instead of, or in addition to, water.
#261
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 05:39 PM
Quiz: Greening the cube farm

ANSWER FOR 2

Linux (often pronounced LIH-nuhks with a short "i") is a Unix-like operating system that was designed to provide personal computer users a free or very low-cost operating system comparable to traditional and usually more expensive Unix systems. Linux has a reputation as a very efficient and fast-performing system. Linux's kernel (the central part of the operating system) was developed by Linus Torvalds at the University of Helsinki in Finland. To complete the operating system, Torvalds and other team members made use of system components developed by members of the Free Software Foundation for the GNU Project.

Ask your Linux questions at ITKnowledgeExchange.com

Linux is a remarkably complete operating system, including a graphical user interface, an X Window System, TCP/IP, the Emacs editor, and other components usually found in a comprehensive Unix system. Although copyrights are held by various creators of Linux's components, Linux is distributed using the Free Software Foundation's copyleft stipulations that mean any modified version that is redistributed must in turn be freely available.

Unlike Windows and other proprietary systems, Linux is publicly open and extendible by contributors. Because it conforms to the Portable Operating System Interface standard user and programming interfaces, developers can write programs that can be ported to other operating systems. Linux comes in versions for all the major microprocessor platforms including the Intel, PowerPC, Sparc, and Alpha platforms. It's also available on IBM's S/390. Linux is distributed commercially by a number of companies. A magazine, Linux Journal, is published as well as a number of books and pocket references.

Linux is sometimes suggested as a possible publicly-developed alternative to the desktop predominance of Microsoft Windows. Although Linux is popular among users already familiar with Unix, it remains far behind Windows in numbers of users. However, its use in the business enterprise is growing.

Linux is a contraction for Linus' Unix; the short i sound preferred by most (including Torvalds) derives from the Swedish pronunciation of Linus.
#262
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 05:38 PM
Quiz: Greening the cube farm

ANSWER FOR 1

$100 laptop

XO is the first version of the $100 laptop expected to reach a substantial number of users. The $100 laptop is a product that several computer companies and thinkers have suggested over the years to help bridge the digital divide and bring information service to people in rural areas of developing countries. MIT's Media Lab founder Nicholas Negroponte, co-founder of the One Laptop per Child (OLPC) initiative, first proposed the $100 laptop as a way to encourage education and alleviate third world poverty.

The OLPC project plans to roll out approximately 2,500 laptops to eight countries in February 2007. The intention is to produce five million laptops by July 2007, scaling to 50 million by 2008. This version of the $100 laptop, called XO, will cost $150 but the expectation is that mass production will bring the cost down to $100 by 2008 and below that figure by 2010.

Some details:

    * XO is about the same size as a text book and lightweight (target weight is less than 1.5 kilograms), with an integrated handle.
    * When the laptop is closed, the keyboard and display are hermetically sealed to prevent dust and water from damaging the machine.
    * The display features a 7.5-inch 1200 x 900 pixel LCD screen.
    * The display changes from color to black and white for viewing in bright light (such as outdoors).
    * A string pulley, which Walter Bender of OLPC likens to a salad spinner, powers the battery.
    * One minute of pulling generates 10 minutes of power.
    * XO operates in thin client mode -- there is no hard drive or PCMCIA slot.
    * XO includes a Web cam and programs for creating music.
    * The laptops have wireless networking capabilities and use a lightweight version of Fedora (see skinny Linux ).
    * XO is built without toxic materials.
#263
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 03:42 PM
Quiz: Blade servers

ANSWER FOR 10


CRAC units with existing HVAC

We're building an existing room into a high thermal density datacenter. Our facilities HVAC rep intends to supplement the new CRAC Units with existing general house HVAC registers, to assist with managing the high heat loads. Will this arrangement cause more pressure and flow problems than it attempts to solve?I'm sure you'll understand that I can't give a definitive answer without seeing the full designs, but I can certainly provide some issues and concerns I would want addressed if I were ...
#264
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 03:29 PM
Quiz: Blade servers

ANSWER FOR 9


Block those holes!

Where does all that air go? One thing's for sure -- in most data centers much of it never makes it to the equipment it's supposed to cool. Lots of cold air leaks out of a multitude of openings in the floor tiles, doing virtually nothing. And a lot more disappears right in front of the cabinets after it gets out of the floor. Air conditioning is expensive, and that's a lot of wasted energy and a pile of wasted money, to say nothing of the shorter life you get from equipment that overheats.

It wasn't so critical a few years ago. Energy was cheaper and heat loads weren't as high. But with fuel costs going through the roof and heaters being shipped to data centers disguised as computers, we now have to make things a lot more efficient. The fundamentals are actually easier than you might think. In fact, basic remedies are downright simple, and pretty darn cheap compared with installing more refrigeration.

In most data centers, 25% or more of the cold air is probably being lost. There are two major places to look: your raised floor and your equipment cabinets. Let's start with the raised floor.

The biggest holes are usually the ones the cable comes through (although we've seen entire floor tiles removed, which is just complete foolishness). It used to be standard practice to just cut a 6- or 8-inch square hole, or even larger, no matter how many or how few wires needed to go through it. At one time, when mainframes used those huge "buss and tag" cables, large openings were needed to pass the oversized connectors. And since those holes were usually under equipment that was cooled from below anyway, it really didn't matter. Not so today. RJ-45's, and even the largest power plugs, will go through a much smaller hole. But an amazing amount of air will still leak through that opening, around the spaces that aren't filled with wires. Those holes have got to be sealed. There are two ways: Make some kind of seal yourself -- out of Masonite and duct tape or some such contrivance -- or use a commercial product made for the job that makes it easy to add or remove cables in the future. Two such products are the KoldLok Brush Grommet, and the Sub-Zero Pillow. Take your choice. The Pillow will seal most holes more completely, is less expensive, easier to install and adapts to a wide variety of opening sizes. The Brush Grommet comes in only a few sizes, stops most of the air but not all and can be a little pricey, but it's a lot neater, and no one can remove it and forget to put it back.

Next, look for all those places where pipes, conduits or anything else penetrates the floor. Unlike cables, which are subject to change, these things aren't going anywhere. Seal them with Fire Stop Putty or any good caulking that won't dry up and shrink. If they're too big, the fire stop manufacturers make products to go behind the putty (CableOrganizer.com, NelsonFireStop.com and a host of others). Just don't use fiberglass, mineral wool or any other product that can flake off and get into the air going to your equipment.

Now look all around the room where tiles have been cut to the walls or air conditioners or anything else. A good quality, closed-cell weather stripping will usually seal all these openings. Lastly, look for tiles that don't seat tightly. Some air will leak through the seams between the floor tiles. That's inevitable unless the installation has been made with special products and techniques that fully seal these joints, which is highly unlikely in a data center. But the amount of leakage in a normal, well-installed floor is tolerable IF you have sealed all the other holes. If the floor is older, it may be necessary to have a raised floor contractor come in to re-level the tiles and get them as well aligned and seated as possible. After equipment is in place, however, there can only be a certain amount of improvement. Tiles trapped under equipment racks can't be moved or re-aligned, so they will determine how well adjacent tiles can be aligned. But every little bit helps.

Now let's get to the easiest, most overlooked and usually most effective way to improve cooling in the whole data center: unused panel spaces in cabinets. We must assume that your layout conforms with the accepted "hot aisle/cold aisle" approach, with cabinets oriented "front-to-front" and "back-to-back." If not, there aren't many things you can do to help except to re-orient your cabinets and change your whole layout, which is obviously not easy. But if your installation is "hot/cold aisle," you just MUST close those unused panel spaces. If you don't, the air you manage to push through your perforated tiles gets up to the first unused panel space and just flows right through the cabinet to the back. It's called "bypass air," and it does two really bad things. First, it starves all the equipment above the opening of cold air. There's always a temperature gradient from bottom-to-top that makes the upper equipment run hotter than that closer to the base of the cabinet, but if most of the cold air has escaped through the cabinet before it even gets to the top, that upper hardware is going to run much hotter and will have a much shorter life. Second, the cold air bypassing through the cabinet mixes with the hot air that must return to the air conditioners, cooling it down. That's the air that tells CRAC's how much new cold air to put out. If the return air is already cooled down somewhat, it fools the air conditioners into thinking everything is fine, so they stop working so hard. The result? Less cooling to the hardware, higher temperatures, shorter life and some strange cycling of the air conditioners than can also upset the humidity control.

And there's another factor. (Who said this was easy?) Not only can cold air bypass from front to back, but hot air can bypass from back to front. Since warm air rises naturally, this just worsens a bad situation by delivering even warmer air to the upper computers. In short, you're engaging in "computer euthanasia" simply by leaving these openings. Is it any wonder that the servers toward the tops of the cabinets statistically have a higher failure and error rate than those at the bottom? Load cabinets from bottom to top, and then close all the remaining spaces with blank panels. If you make a lot of changes, or you can't get people to pick up a screwdriver to replace the panels, several manufacturers now make "snap-in" panels. IBM and SMC make them, too, if you can ever locate them on their Web sites. There are probably others, and we know of several cabinet manufacturers who are planning to come out with them. Snap-ins are a little more expensive, but there's simply no excuse for not putting them back in when a change is made.
#265
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 03:28 PM
Quiz: Blade servers

ANSWER FOR 8


check inglenet
#266
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 03:24 PM
Quiz: Blade servers

ANSWER FOR 7


Blades in your data center?

There are many misconceptions about blades and some truisms that are misunderstood. In order to thoroughly evaluate the benefit of blade servers for your environment, there are some principles that must be understood. Implementing blades, how many, and what options to chose will all depend on a successful ROI and TCO model for your organization. One thing that organizations have done in the past is to take ROI and ownership statements verbatim from manufacturers. These will not always apply due to the fact that in some cases, stated savings are false if the expenditure did not already exist.

One thing is true, however, and that is that blades are becoming more tightly integrated with storage, either in a SAN environment or as NAS. New options also exist in the way of management and virtualization of servers. The coexistence of the technologies can provide a significant savings to companies through ease of management and a more integrated environment.

One of the largest misconceptions is that Blades will cause an increase in your cooling and power consumption. While this may be true in some cases, this does not mean that you will have to completely revamp your facilities. In fact in some environments, this change may not be needed at all. Many data centers suffer from abandoned cable issues which create an air dam and may keep cooling units and chillers from operating at peak efficiencies. This is due to systems changing out over time, older point to point systems and non-structured cabling. These are all reasons why the new TIA 942 data center standard recommends running all cabling accommodating growth so that these areas do not have to be revisited.

With that said, any time there is a large equipment change, it is prudent to reevaluate your facilities and infrastructure. Blade server chassis can be outfitted with a variety of networking options. Connectivity will typically be either network only, or network and storage. Understanding what the needs are for your organization can assist with this. When planning your facilities, you should examine not only the new equipment, but also what equipment will be leaving the data center. There are many options for providing power and cooling to the data center.

There is retrofit gear from Liebert, APC and others to assist. Which you chose will be highly dependent on preference, availability and legacy facility gear. This is not to say that you will always choose the same manufacturer, but certainly, all options should be addressed. What was a great solution at one time, may be inefficient today. The same would hold true if you were adding rack mount servers, main frame connections, or midrange server connections, as well as any storage.

In some cases, it may be advantageous to select a product that will scale with your purchases. Cabinets such as the InfrastruXure line provided by APC allow you to add cooling and power conditioning as needed which could save money as opposed to "over supplying" facilities and incurring the ongoing expenses of power consumption for areas where that power/cooling is not needed immediately. It is important to consider not only day one expenses, but also those recurring year after year. In each of these calculations, you will want to look at management capabilities and security within your enclosures as well.

While some of your cabinets may not be completely full with servers, if you factor processing power per square inch of data center space, you are likely to still be ahead. In order to determine the benefits here, you should factor day one equipment expenditures, cost of the floor space, facilities and then divide by the amount of processing power in contrast. This will help you arrive at your total equipment total cost of ownership. For instance, if I can get the same processing power out of one blade server with 4 blades in a 6RU (rack unit) footprint compared to 4 2RU footprints, I am saving 2RU in my cabinet. However with growth potential, new applications and servers will require the addition of a blade server – no RU loss of space.

Depending on the processors chosen, if I divide the total RU's by processing power, blades quickly become attractive to these budgets. The servers can be upgraded without having to change out the chassis in most cases, which is another benefit.

While you are comparing the server and cabinet to other configurations, you must deduct the additional port costs on your storage and network switches. In a 2RU rack mounted server, you will typically have 4 connections: one for the primary network connection, one for the secondary network connection, one for inband monitoring and finally one for out of band monitoring. With a blade server, the chassis can share these connections. The additional switches that would be required to support these connections are a savings. While each blade may have its own primary and secondary connection, the monitoring now is limited to two per chassis rather than two per server.

Bear in mind that the minimal cabling savings is minor. The real savings is in the initial purchase of the added switch ports, monitoring ports and monitoring software if it is priced by the port. Day two savings are through additional maintenance costs that would be realized. These will also become part of the comparison figures. In a rack mount situation, you may fill the remainder of the cabinet with switch ports which also require power, cooling and maintenance. This can make a half empty rack look attractive over viewing it as a "waste" of floor space.

The trend in data centers has been to fill every available rack unit with equipment, cabling or something and to waste none due to the cost of the data center floor space. However, as data is becoming more and more important to companies, the most efficient calculations are changing from the standard fully loaded rack to the most efficient use of space. The efficiency will be based on processing power, cooling, heating and benefit. Once the physical comparisons are complete, the next step is to address people and resource savings. This is above and beyond what we have considered thus far.

People savings and resource savings will include, boot from SAN technology where desktop administration may be lessened through a single user interface, administration savings realized through a single chassis as opposed to many separate chassis, patch management, remote monitoring and NOC resources, etc. These calculations will be unique to every company and every situation. It is no secret that most application vendors would rather have their own server and not share any applications with any other vendors to help lessen troubleshooting time.

Adding your equipment equations to your people resource equations will provide you with a useful ROI tool. Adding day two expenses with all things considered will provide you with a meaningful total cost of ownership. Each vendor will have specific heating and cooling requirements. For an excellent tutorial, go to IBM's website.

Blade servers can also provide the savings in these areas. The chassis becomes a single point of management not only in regards to networking gear, but also in regards to people resources. This translates to a direct savings in time for daily operations and troubleshooting. The BladeSystems Alliance is a non-vendor specific site for end-users, analysts and others to learn more about blade servers and the technology that surrounds them. From here, you can find links to server manufacturers, connectivity options, cabinet and cooling manufacturers, storage providers and software companies. Or as always, feel free to send me your questions here at TechTarget.
#267
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 03:23 PM
Quiz: Blade servers

ANSWER FOR 6


Cooling high-density racks

We're considering a server consolidation program using blade servers, but we're concerned about the heat from high-density racks.You're right to be concerned – excessive heat can affect the performance, availability and lifespan of electronic equipment. Fortunately, data center cooling technology has kept pace with equipment densities and solutions are available today that not only provide the capacity to meet the today's requirements, but have the flexibility to adapt to the next ...
#268
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 03:22 PM
Quiz: Blade servers

ANSWER FOR 5


State of the blade: Report from the Server Blade Summit

GARDEN GROVE, Calif. -- Blade server advocates convened in Southern California last week to discuss the server density revolution. Industry representatives and IT pros examined the effect this fast-growing server form factor is going to have on the data center.
For more information:

Blades cutting a slightly larger share of server market

Perils and pluses of a single-vendor data center
   

Single vendor standardization
From the IT pros in attendance at this conference, one thing came across very clear: IT shops are standardizing on one platform for blades -- for better or worse.

Lance Ware, CEO and chief technology officer at Anaheim, Calif., digital media company SyncCast, said supporting a common hardware platform has made his job a lot easier to manage server inventory.

"It limits the number of spare [servers] we needed to have. It was very hard to keep spare parts before," Ware said. "It also minimizes the learning curve for someone on staff to bring others up to speed."

Ware downsized SyncCast's server footprint by a factor of 2 to 1 using Dell blades. The company has remote data centers in Asia and Europe where space is very limited, as well as a facility in Southern California.

"Certainly you're paying more [for blades] than 1U servers, but it's paid off for us," Ware said. But there are drawbacks.

Ware said blades often have a slower upgrade cycle than rack-mounted hardware. Plus, the reselling market is small for used blade servers. "There's not a lot of market for this stuff," Ware said. "It's pretty hard to move this equipment and makes transitioning more challenging for many companies."

Another complaint is that the internal Ethernet switches don't seem as robust as external switches from Cisco Systems Inc. and others.

When asked what he would have done differently, Ware said early adopters often paid the price of new technologies. He might have waited for the next generation of blades. "There were not a lot of choices two and a half years ago," Ware said. "I'm not sure if there was a better choice at the time."

Other attendees also specified on single-vendor platforms, including Kyle Ohme, director of IT at Freeze.com, a Waite Park, Minn.-based screensaver graphics company. Ohme said his organization standardized on all IBM BladeCenter offerings.

Craig Newell, director of utility computing at TranTech Inc., a consulting firm working on a consolidation project for the U.S. Census Bureau, said the Census Bureau standardized on two platforms, IBM's BladeCenter and blades from Marlborough, Mass.-based Egenera for the Census Bureau's higher performance applications.

State of the blade
According to Anil Vasudeva, president of Imex Research, blade servers will grow to 34% of all server shipments by 2009. During a keynote, Vasudeva said IBM is way ahead in market share at 39% with Hewlett-Packard Co. (HP) trailing at 32%. Dell Inc. has come out of nowhere at 9.7%, Fujitsu and NEC Solutions Inc. account for about 5% of the market. IBM also leads in technology choices with Intel and AMD power-based blades, as well as multiple operating systems, including Microsoft, AIX, Sun Solaris and Linux; and it also has three chassis offerings -- BladeCenter, BladeCenter T (telco and rugged deployments) and BladeCenter H (for high speed). Vasudeva said IBM is cheaper than HP on the average selling price and Dell is cheaper than both.

Speaking of pricing, attendees wanted to know why blades -- a smaller form factor --cost more than 1U servers. According to Doug Balog, vice president of blades for IBM, that is not a complete analysis. Balog said the true cost of deploying a 1U server needs to include redundant management, power, keyboard-video-mouse adapters and networking infrastructure. Balog said blades are a lot less expensive when you look at the total cost. Despite assurances of return on investment, attendees grumbled that it's the capital expenses that often drive decisions.

Big Blue was the 800-pound gorilla at the event with the other server vendors conspicuously absent, so IBM got to tout its vision for the forward deployment of blade servers. A big part of IBM's strategy for blades has to deal with getting them out of the data center and into retail stores, banks and other facilities that need compute power but don't have the skills or facilities to support a data center.

Applications for self-checkout, video surveillance, radio frequency identification, Voice over Internet Protocol and other data are demanding on-site servers. Companies can preconfigure these packages and roll them out while the technology is still fresh. It's a way to fit a lot of technology in one box, use one rollout scheme and one management to control it. There are still things that belong in the data center though, and it remains to be seen how these technologies are going to work out.

Blade servers = heavy metal
Almost every conversation I heard about blades inevitably turned to power and cooling. But something you hear less often is the problem with weight. Steve Wada, an IBM xSeries/BladeCenter technical sales guy, has been on the ground the last few years, meeting with customers and living in the real world. He was a pinch hitter at the conference, speaking for someone who couldn't attend, and he offered one of the most practical sessions I attended.

Wada told the cautionary tale of the University of New Mexico's high-performance computing center. It was built on the second floor of an old Cadillac dealership with offices below. A secretary noticed a crack in the ceiling above her desk from the massive weight of the blades above. Wada said the facility now has four jack bars holding up the second floor.

You can't cheat physics -- and according to Wada, a fully populated blade rack weighs nearly a ton. "It sounds silly until you can't do it. Most people run into the power and cooling issue first," Wada said. "Hopefully, you know what you bought [with a raised floor] and it's rated by a building standards code."
#269
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 03:21 PM
Quiz: Blade servers

ANSWER FOR 4


Re-engineering: A migration migraine

The re-engineering category of expenditures accounts for redesigning the network structure, retraining administration and support personnel, retraining users whose operating procedures will be slightly or completely affected, and (no less importantly) executing the migration plan.

Re-engineering redefines a company's entire concept of its core asset, information. This redefinition is not an upgrade; moreover, it is a paradigm substitution. Long-time Windows users—especially administrators—often fail to appreciate the realities of the world these other users hail from, and the depths of their rational skepticism toward any campaign, however well-meaning, to transplant them from a realm that, seemingly just yesterday, was characterized as ideal.

Think about the following key characteristics of re-engineering from the perspective of the prospective migrant:

    * In most NetWare environments, what a user has rights to is defined mainly by the password barriers restricting access to a storage device, then secondarily by the DOS-style attributes for the files stored on that device. In these environments, there is no clear statement or record of what any one particular user can or cannot do, based on who he is. So the concept of "importing profiles" fails to apply to that realm; one has no profile beyond the collective restrictions placed on her by the various storage devices and logical volumes. The issue here becomes "creating profiles." And, while the chapter for that topic in most Microsoft literature is generally shorter, that's because the topic is more about creating them than comprehending them and, more importantly, enforcing them.

    * The topology of older LANs was not designed for the rapid distribution of files or the centralization of resources, but instead for the facilitation of so-called "local data" and so-called "remote data." Sometimes the data that belongs to you (your spreadsheets, your documents) was on your own PC, while the "remote" server presented you with a consistent view of the company database, and a repository for those application components which can be centralized. Even the most performance-evolved networks that sprouted from this topology—which are still in use today in countless small businesses—maintains and even reinforces the archaic notions of local and remote data. So now that Windows Server 2003 has made a DNS topology economically viable for small businesses, it is no wonder that numerous trainees for this new realm actually start imagining such subdomain distinctions as \local and \remote for compartmentalizing company data in a familiar manner.

      NOTE
      Imagine an English-speaking person learning German for the first time, encountering a chapter in a textbook on the formation of infinitive-case verbs, without ever being told that all infinitives in German fall at the end of their sentences. We tend to consider the fundamentals of the realm we live and work in every day as though they were historically grounded, forgetting that any transition to a new set of fundamentals requires not only retraining but un-training, which generally takes longer.

    * The centralization of resources without respect to distance between storage devices or processors, made possible by the Internet-derived Domain Name System (DNS) adopted by Active Directory, enables a more function-oriented, less geographical approach to designating the roles of various hosts. One Microsoft server specialist calls this transition migration-by-role. The term has not caught on, but it should. It implies the possibility of a smooth absorption of authority from the various affiliates in the older network topology, to a domain of one or more processors that logically represents each function as a whole for the entire company. Only phased migration is a foreseeable strategy for such a process, where the company can focus on one absorption at a time. But even the smoothest technological strategies fail to take into account the subsequent delegation of personal authority over information resources that the older topology had spawned. Administration of applications, database facilities, and user policies has also been geographically distributed in companies that had adapted to the older technological structure. In such migrations, the job of re-engineering often crosses over from IT into Personnel.

    * Most Chief Information Officers view their business' most valuable asset to be their core business logic. To this day, international banking institutions retain their investment in decades-old mainframe "big iron" because, regardless of how many new flavors of Visual Studio .NET Microsoft invents every year, the next generation of that logic has yet to be created. Technologically speaking, it's feasible for a three-tier network to make mainframe logic available through middle-tier "blade" servers, and Windows Server 2003 is a leading candidate to run those servers. The first networked applications for LANs, although newer than "big iron" tasks, were based on mainframe processes. So in an era when the role of a PC's operating system was to provide the command line and let you occasionally run CHKDSK, the business application also managed the user. If there was such a thing as policy management, it took place on the application level. As a result, businesses that still have no choice but to retain their investment in older logic, end up replicating functionality such as user management (logins, permissions, time-stamps) even after the migration is completed. The changing role of the operating system fails to account for the obstinate role of older applications.
#270
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 03:21 PM
Quiz: Blade servers

ANSWER FOR 3


A blade server is a server chassis housing multiple thin, modular electronic circuit boards, known as server blades. Each blade is a server in its own right, often dedicated to a single application. The blades are literally servers on a card, containing processors, memory, integrated network controllers, an optional fiber channel host bus adaptor (HBA) and other input/output (IO) ports.

Ask your blade server questions at ITKnowledgeExchange.com

Blade servers allow more processing power in less rack space, simplifying cabling and reducing power consumption. According to a SearchWinSystems.com article on server technology, enterprises moving to blade servers can experience as much as an 85% reduction in cabling for blade installations over conventional 1U or tower servers. With so much less cabling, IT administrators can spend less time managing the infrastructure and more time ensuring high availability.

Each blade typically comes with one or two local ATA or SCSI drives. For additional storage, blade servers can connect to a storage pool facilitated by a network-attached storage (NAS), Fiber Channel, or iSCSI storage-area network (SAN). The advantage of blade servers comes not only from the consolidation benefits of housing several servers in a single chassis, but also from the consolidation of associated resources (like storage and networking equipment) into a smaller architecture that can be managed through a single interface.

A blade server is sometimes referred to as a high-density server and is typically used in a clustering of servers that are dedicated to a single task, such as:

    * File sharing
    * Web page serving and caching
    * SSL encrypting of Web communication
    * The transcoding of Web page content for smaller displays
    * Streaming audio and video content

Like most clustering applications, blade servers can also be managed to include load balancing and failover capabilities.
#271
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 03:19 PM
Quiz: Blade servers

ANSWER FOR 2


A blade server is a server chassis housing multiple thin, modular electronic circuit boards, known as server blades. Each blade is a server in its own right, often dedicated to a single application. The blades are literally servers on a card, containing processors, memory, integrated network controllers, an optional fiber channel host bus adaptor (HBA) and other input/output (IO) ports.

Ask your blade server questions at ITKnowledgeExchange.com

Blade servers allow more processing power in less rack space, simplifying cabling and reducing power consumption. According to a SearchWinSystems.com article on server technology, enterprises moving to blade servers can experience as much as an 85% reduction in cabling for blade installations over conventional 1U or tower servers. With so much less cabling, IT administrators can spend less time managing the infrastructure and more time ensuring high availability.

Each blade typically comes with one or two local ATA or SCSI drives. For additional storage, blade servers can connect to a storage pool facilitated by a network-attached storage (NAS), Fiber Channel, or iSCSI storage-area network (SAN). The advantage of blade servers comes not only from the consolidation benefits of housing several servers in a single chassis, but also from the consolidation of associated resources (like storage and networking equipment) into a smaller architecture that can be managed through a single interface.

A blade server is sometimes referred to as a high-density server and is typically used in a clustering of servers that are dedicated to a single task, such as:

    * File sharing
    * Web page serving and caching
    * SSL encrypting of Web communication
    * The transcoding of Web page content for smaller displays
    * Streaming audio and video content

Like most clustering applications, blade servers can also be managed to include load balancing and failover capabilities.
#272
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 03:18 PM
Quiz: Blade servers

ANSWER FOR 1


A server blade is a thin, modular electronic circuit board containing one, two, or more microprocessors and memory, that is intended for a single, dedicated application (such as serving Web pages) and that can be easily inserted into a blade server, which is a space-saving rack with many similar servers.

One product offering, for example, makes it possible to install up to 280 blade server modules vertically in multiple racks or rows of a single floor-standing cabinet. Blade servers, which share a common high-speed bus, are designed to create less heat and thus save energy costs as well as space.

Confusingly, individual blades are also sometimes referred to as "blade servers."
#273
The Sidewinder X6 is a gaming keyboard worthy of standing up against Logitech's G15 - a long time favorite with enthusiasts.

plus:

Comfortable keys, Large volume and backlight dials, Swappable Numpad (doubles up as macro keys), Plenty of programmable macro keys, Aggressively priced, Killer looks.

minus:

Lack of USB ports.
#274
Asus has added yet another netbook to their current Eee PC line-up for India. Asus announced Eee PC 904HA for the Indian market. We reported about the specifications of Eee PC 904 back in July.



With Eee PC 904HA, Asus promises to offer larger storage with a 160GB SATA HDD with 10GB Eee Storage online and longer battery life of up to 7 hours. This model will be available for Rs. 22,999.

The ASUS 904HA features an Intel Atom N270 processor and an 8.9-inch LED backlight display offering 1024 x 600 resolution. Not surprising, but again, this model of the Eee PC comes with a Windows XP operating system. By bundling a 160GB SATA HDD in this model, Asus plans to offer more storage. However, it would've been great if they could offer more storage in their Eee PC 1000H model for India.



Featuring the Super Hybrid Engine technology of Asus, the 6-cell battery promises 7 hours of battery life. The remaining features are similar to their other Eee PC models - a built-in 1.3 megapixel cam, a Mic, a WLAN (802.11 b/g), and a 1GB DDR2 RAM.

Interested folks can also check out Asus's Eee PC microsite for India.

Asus now has competitors like MSI, Lenovo, Acer, and others in the netbook market in India.
#275
Samsung P3 PMP Breaks Cover

It took more than a year for Samsung to reveal YP-P2 PMP's successor. Now the buzz is that Samsung is ready with the upgraded version of P2 -- the P3.

Samsung P3 is almost identical to P2 but now its entire chassis is made of aluminum. It's also got storage upgrade, which now goes from 4GB to 32GB, widget-like user interface and haptic feedback. Haptic technology is nothing but a vibration when a user touches the screen to give him a feeling of tactile feedback.

Other features remain the same like the 3-inch WQVGA screen (480 x 272 pixels), Bluetooth with A2DP, DNSe 2.0 for audio playback enhancement, mono speaker, FM tuner and a microphone. The expected battery life is 30 hours for audio and around 5 hours for video.

The price or availability is still a mystery as Samsung is expected to make it official in CES next year. For the time being, all we can do is ogle at the pictures of the player.








Supported formats:
Audio: MP3/WMA/OGG/AAC/FLAC
Video: MPEG-4/WMV/H.264
Image: JPEG/BMP/PNG
#276
What was intended to be a harmless software update turned out to be a hassle for many AVG users yesterday. Apparently, the virus scanner released yesterday contained an incorrect virus signature. The signature led to a user alert about a Trojan in the critical Windows system file user32.dll. The Trojan, PSW.Banker4.APSA or Generic9TBN was mistakenly identified as being infecting the system file. The scanner then advised users to delete this file. Doing so caused Windows to crash and go in to a reboot cycle.

Users with the latest and previous versions of AVG were equally affected. However, the issue was noticed only with systems using Windows XP. AVG has since then issued a patch, which corrects this problem. For people who have been affected by this please visit the AVG support forums for help wit the fix. There are separate sections for users with AVG 7.5 and AVG 8.0.

AVG has also issued an announcement apologizing users for the inconvenience caused which says, "Affected users unable to use their PCs should contact their AVG reseller or ask a friend to download the information and fix tool for them. After running the fix tool, users should run the AVG update program to download and install the correct AVG update. AVG sincerely regrets the inconvenience users have experienced. We are working to remedy the problem and ensure that any other potential vulnerabilities are identified and eliminated before they can impact users."

AVG is a popular free antivirus suite and is known for its dedicated user base.
#277
It's official folks. Sony Ericsson's latest and possibly greatest handset, their Windows Mobile 6.1 enabled Xperia X1 is due for launch on November 28th 2008 - that's in a couple of weeks. Of course it's initially launching in the US so it'll be a little while before it gets here.

"The Xperia X1 continues the Sony Ericsson tradition of delivering the highest quality experiences and the most advanced technology available today," said Karen Morris, vice president of marketing, Sony Ericsson North America. "The most exciting scenarios enabled by the Xperia X1 will be created by consumers - enabling them to customize and personalize their device and content to fit their lifestyle and personality."



The Xperia X1's unique panel user interface is at the heart of the device's ability to create and adapt consumers' personal choices. With up to 9 panels, it's easy to find and enjoy the information and entertainment content they want. Sony Ericsson is busy working with third-party developers to create a wealth of new applications and new panels that will soon be available for download.

"Windows Mobile gives people the ability to easily navigate between their business and personal lives," said Todd Peters, vice president of marketing, Mobile Communications Business, Microsoft. "The panel user interface found only in the Xperia X1 is bringing unique experiences to consumers who want more from their converged devices."




As Sony Ericsson's most advanced phone to date, the Xperia X1 brings together a large, 3-inch wide VGA display touchscreen and a full QWERTY keyboard all wrapped into a sleek silver metal-finished arc slider handset. The Xperia X1 supports 3G networks, enabling audio and video streaming, high-speed internet surfing, multimedia messaging and email on the go. In addition to delivering 3G mobile broadband speeds, the Xperia X1 supports Wi-Fi to meet the needs of consumers' always connected lifestyles. In the tradition of Sony Ericsson, the Xperia X1 also offers a 3.2 megapixel camera, video streaming, video playback and video recording, and the ability to enjoy all their digital music.

"The Xperia X1 complements Sony Electronics' family of Windows-based devices and leverages the company's heritage of providing beautifully designed, highly functional, portable electronics," said John Kodera, vice president of product marketing, Sony Electronics. "The Xperia X1 delivers the highest quality entertainment, communication and personalization options for consumers."




The Xperia X1 will be available unlocked through Sony Electronics and its authorized retailers. Pre-orders of the Xperia X1 will be available through the Sony Style Web site at www.sonystyle.com beginning today. This premium device will be sold unlocked for an MSRP of Rs. 39, 119 ($799.99), giving consumers the freedom to choose their own mobile operator and data plan.
#278
It seems like HTC was not content with being the first to introduce a handset with the Android OS (G1) or a full touch screen handset with a WVGA resolution in their HTC Touch HD. They apparently are looking to be a very dominant company when it comes to setting a bar. Their latest is the worlds first handset to incorporate an integration of GSM and WiMAX technology in a single handset called the HTC MAX 4G for the Russian provider of Mobile WiMAX Scartel (brand Yota).



With its 3.8 inch, 800×480 pixel resolution display and 8 Gigs of internal memory running on a Windows Mobile 6.1 OS, the handset will give users a lot more than they bargained for. Other features include TV out capability, VoIP, a 3.5mm earphone socket for the handsfree and of course HTC's TouchFLO 3D UI.



As of now it's going to be out only in Russia considering their WiMAX capabilities so it just might be a while before it gets here. In the meantime there's plenty more we can expect from the company like the HTC HD Touch PRO and more importantly the G1.
#279
Hot News - InFocus / Re: latest science news
Nov 13, 2008, 02:36 PM
New Laser Method Reproduces Art Masterworks To Protein Patterns

Canadian researchers have created a new protein patterning technique that's enabled them to reproduce complex cellular environments and a miniature version of a masterpiece painting.

According to a new study published in the journal Lab on a Chip, scientists from Université de Montréal, the Maisonneuve-Rosemont Hospital Research Centre, McGill University and the Montreal Neurological Institute have developed a laser technology that can mimic the protein patterns that surround cells in vivo and that could lead to great advances in neuroscience.

To illustrate the precision of their protein patterning technique, the research team reproduced a masterwork of Dutch painter Johannes Vermeer, specifically Girl with a Pearl Earring, in the miniature dimension of 200 microns wide or about the thickness of two hairs. The researchers also used their novel technology to replicate the brain's complex cellular environment. It's a major discovery, since the new laser technology can encourage and guide the growth of finicky nerve cells.

"We have created a system that can fabricate complex methods to grow cells," says Santiago Costantino, the study's lead author and a scientist at the Université de Montréal and Maisonneuve-Rosemont Hospital Research Centre.

"We see this technique as being very relevant to neuroscience and immunology research. With this system, we laid down a chemical gradient to guide the growth of nerve fiber, which is very useful in studying nerve damage and repair."

Flexible and precise

Using laser-assisted protein adsorption by photobleaching (LAPAP), the scientific team bound fluorescently-tagged molecules to a glass slides and created patterns of proteins similar to those of the human body. They then demonstrated how flexible and precise this technique could be by reproducing a fluorescent micro version of Girl With a Pearl Earring.

"The flexibility, precision and ease of this technique will hopefully lead to increased access in protein patterning, which could lead to major advances in science," says Dr. Costantino, who is also a member of the BioFemtoVision Canadian Research Group, which includes researchers from the Université de Montréal and the Institut National de la Recherche Scientifique who are working on developing new laser technologies for vision science.

"Our next goal is to extend laser-assisted protein adsorption by photobleaching to fabricate more complex protein combinations and distributions," adds Dr. Costantino. "We want to improve our imitation of the chemical environment found in the early stages of developing organisms."

This study was funded through grants from the Natural Science and Engineering Council of Canada, the Fonds québécois de la recherche sur la nature et les technologies, Canadian Institutes of Health Research and the Fonds de la recherche en santé du Québec.
#280
Building on the success of the E71, Nokia has announced the latest addition to its Eseries range, the Nokia E63.




"Our research shows that people want a device that deals with both their personal and professional lives, but helps them to separate the two. When someone sits down at lunch, they want to update their social network or browse their personal email account and they don't want work getting in the way of that. It's another great case of technology adapting to the people that use it," says Soren Petersen, Senior Vice President, Nokia. "The Nokia E63 is a new proposition for Eseries - a messaging device where people will be just as involved in their social network as they are in their business network."

The Nokia E63 can switch modes with a single key press, switching from a view of corporate mail, appointments and intranet data, to a personal mode with a picture of friends, personal email and shortcuts to favorite hobby blogs or websites. Petersen adds, "The amazing response we have seen to the Nokia E71, which has very quickly become the best selling model in its category, let us know that we are heading in the right direction. People want a rich experience when using messaging, social networks and the Internet. With the Nokia E63 you can enjoy the web, update your status and work meaningfully with multiple email accounts."

The Nokia E63 also includes Files on Ovi, a service where people can get remote access to their PC files even when their computer is offline. Anyone buying the handset will have access to 1GB of online file storage for free.

The Nokia E63 will be available in ruby red or ultramarine blue with a range of multimedia features.  Record and view images and videos with the digital camera and bright landscape display, listen to music downloaded from the Nokia Music Store, or a number of other sources, via the standard 3,5 mm audio jack or customize the device through the thousands of applications available for download.

The Nokia E63 is expected to begin shipping in the coming weeks for an estimated retail price of EUR 199, before taxes and subsidies.
#281
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 12:05 PM
Quiz: Workstations

1. This is a feature included in Microsoft's Windows 2000 serverthat allows network administrators to install the Windows 2000 Professionaloperating system and its upgrades to any number of workstations atone time from a centralized location.
a. ATX
b. CPI
c. RIS
d. CPU
e. ALU

2. This feature is useful for downloading software updates or reconfiguringcomputers during late-night hours when a company's computers are usually turned off.
a. firmware
b. virtual keyboard
c. standby power
d. remote wakeup
e. Power-On Self-Test

3. On a workstation, this is a customized graphical user inferface (GUI).
a. eye candy
b. desktop theme
c. desktop management interface
d. personal home page
e. chip art

4. In the Windows 2000 operating system, this is a collection of settingsthat define what a system will look like and how it will behave for a selectgroup of users.
a. Group Policy Object
b. ASSP
c. impression
d. CISC
e. instantiation

5. This is the detailed recording and updating of information that describesan enterprise's computer systems and networks, including all workstationsand their hardware and software components.
a. master boot record
b. boilerplate
c. configuration management
d. conversational monitor system
e. access log

6. This product from Symantec can clone (copy) the entire contents ofa hard disk to another computer's hard disk, automatically formatting andpartitioning the target workstation.
a. ghost
b. port replicator
c. carbon copy
d. e-copy
e. hologram

7. This is a program that emulates the Windows OS on a Macintosh computer.
a. iMac
b. Darwin
c. fat MAC
d. virtual PC
e. crippleware

8. In a Windows NT environment, what the user sees on his or her workstation, as well as what files, applications and directories they have accessto, is determined by how the network administrator has set up this.
a. user profile
b. hardware abstraction layer
c. LANDesk Client Manager
d. InstallShield
e. localization

9. This management tool can be used in a classroom system where one PC becomes the "master" of student computers, automatically reconfiguring them or turning them off at night.
a. big-endian and little-endian
b. remote-control software
c. reconfigurable processor
d. Voodoo
e. distributed file system

10. This is an open source graphical desktop environment for UNIX workstations.
a. Bourne shell
b. OpenCourseWare
c. Red Hat
d. Visual InterDev
e. K Desktop Environment
#282
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 12:03 PM
Quiz: Servers

1. This is a computer with a Web server that serves the pages for one or more Web sites.
a. portal
b. host
c. gateway
d. business service provider
e. backbone

2. This is a variable value (for example, a "last modified" date) that a server can include in an HTML file before it sends it to the requestor.
a. end effector
b. data set
c. active server page
d. server-side include
e. instruction

3. This is a computer containing programs that collectively serve the needs of a large group rather than that of a single user or specialized application.
a. terminal server
b. Web server
c. central processing unit
d. enterprise server
e. complex instruction set computer

4. This is when you divide work that a server has to do between two or more computers so that more work gets done in the same amount of time and, in general, all users get served faster.
a. fast packet technology
b. cache coherence
c. multi-carrier modulation
d. load balancing
e. time-division multiplexing

5. This is a freely available Web server that is distributed under an open source license.
a. Apache
b. Linux
c. GNU
d. Open Service Gateway Initiative
e. Unix

6. This is a standard way for a Web server to pass a Web user's request to an application program and to receive data back to forward to the user.
a. interrupt request
b. Forward DNS lookup
c. data-link layer
d. File Transfer Protocol
e. common gateway interface

7. This is a group of servers that share work and may be able to back each other up if one server fails.
a. channel bank
b. cluster
c. tiger team
d. serverless backup
e. logical unit

8. This is a server that saves Web pages that users have requested so that successive requests for these pages do not require the use of the Internet.
a. dedicated server
b. virtual server
c. Domino Off-Line Services
d. Object Request Broker
e. cache server

9. This is a microprocessor based on the 64-bit architecture known as IA-64.
a. TiVo
b. UPnP
c. Itanium
d. EPIC
e. InfiniBand

10. This is the delivery of information on the Web that is initiated by the information server rather than by the information user or client, as it usually is.
a. content delivery
b. go bosh
c. push
d. hypermedia
e. spamdexing
#283
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 12:02 PM
Networking News

Do you speak 'router' geek?


Are you a real Know-IT-All? This week a challenge you to find out. Ten hints for ten terms in our glossary that relate to routers. How many can you guess without peeking?

1. This is network bridge and a router combined in a single product.

2. Routing is a function associated with this layer in the standard model of network programming, the Open Systems Interconnection (OSI) model.

3. This device routes data packets between one or more LANs and an ATM backbone network.

4. Using an appropriate algorithm, this tells a switching device what to do with the multicast packet.

5. This forwards packets to computer hosts within a network (but not between networks).

6. This protocol allows host computers on the Internet to use multiple routers that act as a single virtual router, maintaining connectivity even if the first hop router fails.

7. If you're this kind of Cisco expert, you'll specialize in routing and switching, communications and services, security, or voice systems and technologies.

8. Sometimes this layer 2 device is confused with a router.

9. Routers use this table to control access to or from the router for a number of services.

10. This authentication protocol provides remote access authentication and related services, such as event logging.
#284
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 11:54 AM
Quiz: Recycling electronic equipment

Get with the program! The recycling of electronics is only going to get more important going forward. Take quiz to find out how much you know about e-cycling and related terms.


1. How many computers were replaced, worldwide, in the years between 2004-2006?
a. 1-2 million
b. 4-6 million
c. 7-8 million

2. When you delete a file from your hard drive, can its data still be accessed?

3. To provide a minimal level of security, what process should the average user perform before recycling their computer? Hint: It will make the user's data harder to access, because it essentially erases everything from the hard drive.

4. This is a device that physically destroys a hard drive to make absolutely sure that data cannot be accessed. What is it?

5. Toxic substances lurk inside many computers. Which of the following is commonly found?
a. lead
b. mercury
c. cobalt
d. all of the above

6. The EPA has established a disposal limit for hazardous waste, including computer equipment. What is that limit?
a. 50 kilograms, the equivalent of 2-3 RAID arrays
b. 100 kilograms, the equivalent of 4-6 RAID arrays
c. 150 kilograms, the equivalent of 6-9 RAID arrays

7. This term means to renew or restore to a new condition and/or appearance. In computers, it usually refers to fixing or replacing components that don't work. What is it?

8. This is the practice of looking for discarded treasure, such as computer components and personal information, in large trash containers. What is it?

9. In a court of law, this is the application of computer investigation and analysis techniques to recover evidence from a computer's hard drive. What is it?

10. This describes the environmentally unfriendly process of losing your temper and discarding hardware, such as a cell phone, by violent means, such as hurling it out a window, against a wall, or into a body of water. What is it?
#285
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 11:52 AM
Quiz: Printers and printing

How much do you know about printers and related technology? Take quiz to find out!

1. This term is what P.S. stands for on a letter. It's also the name of a programming language that describes the appearance of a printed page.
What is it?

2. This printing method, which creates raised and colored areas on paper, is often seen in wedding invitations, business cards and letterheads.
What is it?

3. Which of the following is the oldest form of printing:
a. gravure
b. flexography
c. letterpress
d. screen printing

4. In printing, DPI is the standard measure of printed image quality on the paper.
What does DPI stand for?

5. Engineers at IBM, Kodak, General Electric and RCA turned the inventor of this copying technology away, saying his idea for using electrostatic charges was useless. What is it?

6. Printers are generally classified as "impact" and "non-impact." Which category does a laser printer fall into?

7. Also known as serigraphy, this printing method creates an image on paper, fabric or some other object by pressing ink through a screen with areas blocked off by a stencil.

8. A WYSIWYG editor or program allows a developer to see what the end result will look like while the interface or document is being created. The letters stand for a common saying. (Hint: It's also the title of a Flip Wilson biography.)
What does WYSIWYG stand for?

9. Which of the following is a blanket term that includes such technologies as scanning, photography, xerography and digital printing:
a. biomimetics
b. reprographics
c. pictograph
d. telemetry

10. When a document is "spooled," it's read and saved to be printed when prior documents have been printed. Is "spool" short for anything?
#286
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 11:47 AM
Quiz: Networking Hardware

Those parts of the system that you can hit with a hammer are called hardware; those program instructions that you can only curse at are called software. - Anonymous

This week's quiz has a slightly different format. Your goal will be to match the correct term in bottom of the page with its description in top of the page

1._____ This is any computer device that is not partof the essential computer but is situated relatively close by.

2. _____This is a larger transmission line that carriesdata gathered from smaller lines that interconnect with it.

3._____ This is a computer circuit board or card thatis installed in a computer so that it can be connected to a network.

4._____ On a network, this is your computer's unique hardwarenumber.

5. _____This is the ordinary copper wire that connectshome and many business computers to the telephone company.

6. _____This is a physical device that can pass packetsbetween a legacy application type network (such as an Ethernet) and an ATM network by using data link layer and Network layer information.

7._____This consists of three layers of a semiconductormaterial, each capable of carrying a current.

8._____This is a device or, in some cases, software ina computer, that determines the next network point to which a packet shouldbe forwarded toward its destination.

9._____This is the physical arrangement in a computer that contains the computer's basic circuitry and components.

10.____This is a device that receives a signal onan electromagnetic or optical transmission medium, amplifies the signal,and then retransmits it along the next leg of the medium.

a) backbone
b) circuit
c) transistor
d) bus
e) twisted pair
f) trunk
g) coaxial cable
h) chip
i) interface device
j) motherboard
k) edge device
l) transponder
m) satellite
n) beep code
o) NIC
p) router
q) MAC address
r) repeater
s) peripheral
t) port number
u) acoustic coupler
v) physical unit
w) modem
x) LAN server
y) slot
z) surge suppressor
#287
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 11:43 AM
Quiz: Mainframe Acronym-o-phobia

Acronyms abound in the mainframe world. Words like CICS and MIPS get thrown around every day -- but do you know exactly what they mean? This quiz will test your mainframe acronym acumen. Just click on the hyperlink after the four possible answers to learn the whether you're correct or not. Enjoy!
 
  What does EBCDIC stand for?

    * A) Extended Binary Code Decimal Interchange Control
    * B) Extended Binary Control Decimal Interchange Code
    * C) Easy But Concise Decimal Information Counter
    * D) Extended Binary Coded Decimal Interchange Code

Think you know the answer?  Read the definition for EBCDIC.

  What does CICS stand for as in "Joe Smith develops CICS applications for mainframes."

    * A) Customer Information Control System
    * B) Customer Interface Control System
    * C) Central Information Control System
    * D) Computing Instructions Control System

Think you know the answer?  Read the definition for CICS.

  What does DASD stand for?

    * A) Data Systems Authorization Directory
    * B) Digital's Attempted Storage Domination
    * C) Data Systems Storage Device
    * D) Direct Access Storage Device

Think you know the answer?  Read the definition for DASD.

  What does IMS stand for?

    * A) IBM's Management Scenario
    * B) Infrastructure Managed Services
    * C) Initially Managed Storage
    * D) Information Management System

Think you know the answer?  Read the definition of IMS.

  What does RACF stand for?

    * A) Remote Access Computing Facility
    * B) Resource Allocation Control Facility
    * C) Really Alarming Computing Fact
    * D) Resource Access Control Facility

Think you know the answer?  Read the definition for RACF.

  What does MIPS stand for?

    * A) Multiple Instructions Per Session
    * B) Million Instructions Per Second
    * C) Meaningless Indicator of Processor Speed
    * D) Many Important Selling Points

Think you know the answer?  Read the definition for MIPS here.

  What does MVS stand for?

    * A) Multiple Virtual Storage
    * B) Mainframe Virtual System
    * C) Mainframe Virtualization System
    * D) Multiple Virtualization System

Think you know the answer?  Read the definition for MVS here.

  What does Rexx stand for?

    * A) Reactive Enforcement Execution Exchange language
    * B) Reactived Extendable Exchange language
    * C) Restructured Extended Executor language
    * D) None of the above

Think you know the answer? Read the definition for Rexx here.

  What does zAAP stand for?

    * A) Zippy Application Assessment Program
    * B) zSeries Assistance and Assessment Protocol
    * C) zSeries Application Assessment Protocol
    * D) zSeries Application Assist Processor

Think you know the answer? Learn what zAAP stands for at IBM.com.



  Everyone knows IBM stands for "International Business Machine" but what does the BMC in BMC Software come from?

    * A) Business Management and Control
    * B) Binding Mainframes and Commerce
    * C) Building Mainframe Control
    * D) None of the above -- BMC Software was named after its founders: Scott Boulett , John Moores and Dan Cloer.
#288
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 11:40 AM
Quiz: Laptops

1. This technology is used in the liquid crystal displays of notebook and laptop computers to provide a more responsive image at a wider range of viewing angle.
a. graphics accelerator
b. Zoopraxiscope
c. photonic switching
d. active matrix display
e. bi-level image s

2. This is a hardware frame and set of electrical connection interfaces that enables a notebook computer to effectively serve as a desktop computer.
a. virtual PC
b. intermediate distribution frame
c. docking station
d. brain-machine interface
e. caddy

3. This is a credit card-size input/output device used to connect a laptop computer to a LAN.
a. PCMCIA card
b. capacitor
c. network PC
d. flexible transistor
e. smart card

4. This feature allows a laptop user to replace one external drive with another without having to shut down and reboot.
a. jam sync
b. mean-swap-between-failure
c. crossfade
d. heatsink
e. hot swap

5. This is an attachment for a notebook computer that allows a number of devices such as a printer, large monitor, and keyboard to be simultaneously connected.
a. connectoid
b. port replicator
c. exponential assembly
d. Centronics parallel interface
e. ZIF socket

6. This is a technology that supports the delivery of full-screen motion video and multimedia to notebook computers.
a. megatransfer
b. iButton
c. fat MAC
d. Multimedia Home Platform
e. Zoomed Video

7. This is electrical power that a laptop consumes when it is connected to a power source and is ready to be used -- but is not actually being used.
a. standby
b. apparent power
c. wait state
d. latency
e. capacity on demand

8. Laptop + wireless Ethernet card + automobile =
a. Mobile IP
b. FUBAR
c. European Computer Driving License
d. war driving
e. artificial passenger

9. This presention software comes with a variety of templates that enable a laptop user to quickly create a sophisticated slide show presentation.
a. Flash
b. PowerPoint
c. Voodoo
d. UART
e. PICTIVE

10. This light-weight power source for laptops consists of an anode, a cathode, and an electrolyte.
a. Crusoe
b. Advanced Configuration and Power Interface
c. G.lite
d. Universal Plug and Play
e. Lithium Ion battery
#289
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 11:38 AM
Quiz: HP

1. This is a software suite from HP for managing applications, device availability, network conditions and status, system performance, service and program maintenance, and storage resources.
a. OpenType
b. Tivoli
c. OpenView
d. StarOffice

2. This is a line of HP UNIX-based servers that use HP's 8600 processor with PA-RISC architecture and runs HP-UX.
a. HP 9000
b. S/390
c. e3000
d. ProLiant

3. This is a high-end 64-bit PA-8600 processor-based UNIX HP server designed for e-commerce customers using very large databases. It can be split into several partitions, each with its own operating system.
a. blade server
b. AS/400
c. Superdome
d. Netfinity

4. This is the operating system for the HP 9000 series of HP business servers.
a. Solaris
b. HP-UX
c. AIX
d. z/OS

5. This is a microprocessor based on 64-bit architecture known as IA-64.
a. Xeon
b. Itanium
c. SPARC
d. SOI

6. This is an open software platform, based on XML and designed by HP, that is designed to facilitate the delivery of e-services over the Internet.
a. e-speak
b. .NET
c. EDI
d. SET

7. This is a 64-bit microprocessor instruction set, defined and designed by HP and Intel. It provides up to 128 general and floating point unit registers and uses speculative loading, predication, and explicit parallelism to accomplish computing tasks.
a. RISC
b. EPIC
c. CISC
d. CPU

8. This is a process implemented in Explicitly Parallel Instruction Computing (EPIC)-based processors and their compilers. It increases performance by eschewing branch prediction, where a wrong guess by the processor brings a performance penalty.
a. Speculation
b. Massively parallel processing
c. SMP
d. Predication

9. This is a 64-bit processor architecture developed at Intel that is based on Explicitly Parallel Instruction Computing.
a. Celeron
b. OSI
c. IA-64
d. ATX

10. This is a program that helps a network administrator view and manage the conditions in a computer network. It is part of the OpenView suite of enterprise system management applications. It "discovers" the devices that are in the network and shows their relative location and their status.
a. NNM
b. DCE
c. MIB
d. NIS
#290
Chat Box / Re: Quiz:"HARDWARE"
Nov 13, 2008, 11:35 AM
Quiz: Greening the cube farm

Some of IT's promises have not really come to fruition. Paperless office, anyone? To the contrary, we're printing more than ever. It may not be easy being green but -- hey! -- we've only got one planet. How much do you know about environmentally responsible and sustainable computing practices and technologies?

1. The One Laptop Per Child project rolled out approximately 2,500 XO laptops to eight countries in February 2007. What innovative technology powers them up?
a. a wind-up crank on the side, like an antique Victrola?
b. a pulley system, like a salad spinner?
c. a foot pedal, like a sewing machine treadle?

2. According to a report from the U.K. Office of Government Commerce, servers running this operating system could alleviate the problem of e-waste because they can last twice as long as servers running Windows. What is it?

3. It's been used for years in mainframes and automobiles. Now this cooling method is moving to the data center and can even be used as an environmentally friendly means of providing air conditioning for buildings. What is it?

4. This lightweight Linux distribution can bring new life to old computers, thus keeping them out of landfills (or basement stockpiles). What is it?

5. This concept is far from green -- it's the intentional conception, design and production of a product so that it's useful, functional or popular only for a limited time. What is it?

6. Which type of monitor uses less power, LCD (liquid crystal display) or CRT (cathode ray tube)?

7. These animated applications were created to prevent burn-in on your monitor but that's not so much an issue with current equipment. Although they display when your computer is idle, they require almost as much power as active use. What is it?

8. In a standard incandescent light bulb, 10 percent of the energy output is converted to light. What makes up the other 90 percent?

9. In a green data center, alternative energy technologies might include:
a. photovoltaics
b. evaporative cooling
c. heat pumps
d. all of the above
e. photovoltaics and heat pumps but not evaporative cooling

10. Most electronic equipment that's discarded is still in working order. Even if it isn't, though, it can be passed on to a number of organizations that will do this to it and resell or donate it.
#291
Chat Box / Quiz:"HARDWARE"
Nov 13, 2008, 11:32 AM
Quiz: Blade servers

Blade servers. They're one of the biggest topics in the data center right now. They take up less room than racks, which is good because as your server needs increase, your data center size doesn't. The focus turns to consolidation, and that's where blades come in.

So what's the problem? Two things. Heat and power. It's great that blade servers save space, but they're also working just as hard as the rack servers, which means despite the smaller size, they're giving off more heat. Which means that using blade servers can produce more heat than rack servers. The same thing goes for power requirements. Even so, data center managers are still finding that the TCO is more favorable with blades than racks, which is why, in today's data centers, you're more likely to find--you guessed it--blades.

We've created this quiz to test (and refresh) your blade server knowledge.

1. A server ________ is a thin, modular electronic circuit board containing one, two, or more microprocessors and memory, that is intended for a single, dedicated application (such as serving Web pages) and that can be easily inserted into a _______ server, which is a space-saving rack with many similar servers.

2. The place where a blade server is housed is called a _________.

3. Each blade is a server in its own right, often used for a single _____________.

4. People like blades over racks because blades offer more power in less ________.

5. A fully populated blade rack weighs nearly one _________ .

6. Excessive heat can affect the performance, availability and __________ of blade servers.

7. Many data centers suffer from abandoned ________ issues which create an air dam and may keep cooling units and chillers from operating at peak efficiencies--not all data centers need to revamp their power and cooling to accomodate blades.

8. Before buying a full chassis of blades, enterprises ought to make certain they have a sufficient workload to justify the cost. A good rule of thumb is that a half-populated chassis will cost as much to run and operate as an equal number of ______ servers.

9. Lots of cold air leaks out of a multitude of openings in the _______ tiles, doing virtually nothing.

10. Another issue, besides heat in a data center, is the _________--which is why data centers should have a vapor barrier.
#292
Chat Box / "CROSSWORD challenge"
Nov 13, 2008, 11:23 AM


Across

2. The organization or structure for a database
5. To make a change to stored data
6. A standard interactive programming language
7. A standard database access technology -- developed by Microsoft
9. Stored procedures that may automatically execute
10. A series of facts or statements
12. A list of keys or keywords
14. This term is used to represent a missing value
16. The process of organizing data to minimize redundancy
17. What a user of a database enters

Down

1. Information that is organized so that it can easily be managed
3. Search400.com's DB2 UDB expert
4. A computer's representation of a fact about an entity
8. To copy files or databases so that they will be preserved
9. Data that is arranged in rows and columns
11. A data file that has no structured relationships between its records
13. The collection of all possible values of an attribute
15. Developer of DB2
#293
Chat Box / Re: Quiz:"INTERNET"
Nov 11, 2008, 04:47 PM

Ajax quiz: Do you speak Geek?


ANSWER FOR 9

CHECK OUT IN DOTNET DEVELOPMENT INFORMATION AND RESOURCES
#294
Chat Box / Re: Quiz:"INTERNET"
Nov 11, 2008, 04:46 PM

Ajax quiz: Do you speak Geek?


ANSWER FOR 8

Google uses it, and Microsoft is pursuing it, so there's a lot of hype and hubbub surrounding AJAX (Asynchronous JavaScript and XML). IT directors who listen closely, however, can get the real scoop on this hot technology in this interview with SearchOpenSource.com messaging expert Julie Hanna Farris.

   
Julie Hanna Farris

AJAX brings together some hot properties, Javascript, HTML/DHTML and HTML, according to Farris, founder of Scalix, a Linux-based, e-mail systems vendor, and, previously, Onebox.com (acquired by Openwave), the industry's first unified messaging service; 2Bridge, an enterprise portal software pioneer; and Portola Systems (now SunONE), the first Internet-based enterprise messaging system. Scalix is using AJAX in Scalix Web Access (SWA), a Web-delivered, e-mail application.

What is AJAX, and who -- besides Scalix -- is using it?

Julie Hanna Farris: AJAX is the combined use of Javascript, dynamic HTML or DHTML, and asynchronous XML within Web content. Very simple uses of this technology range from simple interactive experiences within the normal page-based paradigm of HTML, to full Web-delivered applications that provide the interactivity of a desktop application, complete with menus, toolbars, etc.

Google Gmail and Google Maps are good examples of a very simple use of AJAX. For example, when a user scrolls a map, a Javascript method is invoked that repositions the current image and then makes an XML-based request for the image that is needed to fill in the new part of the map. The Google server will eventually return the image, which is rendered in the proper location in the page.

What should IT managers know about AJAX?

Farris: AJAX is ready for prime time. AJAX applications can deliver high function commercial-grade applications that replicate desktop functionality.

AJAX enables the centralized management and delivery of end-user applications like e-mail. Adopting and deploying AJAX applications can dramatically reduce cost, overhead and complexity of installing, updating, maintaining and supporting desktop software on end-user machines. Upgrades are as simple as a single installation on the Web server, ensuring that everyone is running the same version of software.

It's important to remember that AJAX is not a silver bullet. Not all AJAX implementations are created equal. Like with all technology, there are wide differences, in terms of functionality, stability, code quality, etc. On the more advanced side of things, it's possible to replicate desktop functionality, but most uses of AJAX are much more basic. Knowing the functional requirements for different categories of users becomes important.

The bottom line is that AJAX-based applications reduce the cost and complexity of delivering high-quality and highly-functional Web applications.

More on AJAX:

Providing cross-browser applications with AJAX

Addressing e-mail usability and productivity via AJAX
   

Is it just the Google connection that's raised so much interest in AJAX?

Farris: While AJAX has recently gone mainstream, it has been in use for several years, mostly on the esoteric fringe of Web development. For example, SWA has been in the market for almost two years now.

Google's use of AJAX, while fairly simple, has brought some of these concepts into the consciousness of many Web developers. You could say that Google has been the most visible purveyor of AJAX technology, which has helped it to reach a tipping point.

I believe AJAX would have made its way into the broader conscience even without Google's help. It was just a matter of time. If you take a look at the new Yahoo mail client, you will see much more advanced use of AJAX than Gmail or Google Maps. Given that the Yahoo user base is significantly larger than the Gmail base, I suspect that this will do even more to raise broad interest and enthusiasm for AJAX.

Why is Microsoft so interested in AJAX?

Farris: Microsoft is probably interested in AJAX for the same reasons everyone is interested in AJAX: the ability to deliver desktop quality applications through the Web.

What typically sets Microsoft apart from other AJAX application providers is that they do not appear to be interested in the cross-browser capabilities of AJAX applications. One can speculate that Microsoft has ample motivation to use Windows and Internet Explorer-specific features that create a dependency between their AJAX apps, IE [Internet Explorer] and the Windows platform/ecosystem. This has been the case historically.

Could you elaborate on your reasons for believing that AJAX is important to IT managers?

Farris: AJAX provides powerful building blocks for developing platform independent, advanced Web applications that have many of the best features of desktop applications. With that, AJAX allows us to merge the best features of desktop applications with the best features of the Web, in a platform-independent manner. Desktop applications provide a high level of interactivity and richness, while the Web gives us universal access without having to worry about installing software on our desktops.

Before AJAX, Web applications were heavily page-oriented and not very interactive. A user is presented with a page of information, makes a selection and is then presented with a completely new page of information, hence the page refresh problem.

With AJAX, the user is presented with an application interface that they can interact with dynamically, just like a traditional desktop application. The user interface is updated incrementally, eliminating the page refresh problem and the slow response time associated with it.

What new features will AJAX bring to Web applications?

Farris: AJAX enables advanced features like drag 'n drop, dropdown menus and faster performance capabilities, which are now making their way into Web applications. These kinds of capabilities represent a significant leap in the advancement of Web apps. More than just creature comforts, they represent a major step forward in terms of usability, productivity and application functionality.

Before AJAX, Web apps would have to work around the lack of something like drag 'n drop with check boxes and multiple clicks, resulting in multiple steps that quickly become laborious and time-consuming for users.

Does AJAX not play well in any platform or application areas?

Farris: The fact that AJAX is platform independent is a tremendous advantage for both customers and application developers.

For customers, using AJAX means gaining access to a universal client that can run on any desktop platform -- Windows, Mac, Linux, Unix -- and, any browser -- Firefox, IE, Mozilla, Safari, etc.

For software developers, app development is simplified and reduced by an order of magnitude because use of AJAX abstracts the different desktop platforms, making heterogeneity a virtual non-issue.

As more and more Web apps are developed in AJAX, there's another phenomenon that's occurring, increasingly referred to as "mashups." "Mashups" are based on the realization that the user interfaces from any number of AJAX applications can be readily integrated with each other, making application integration at the user interface level much easier.
#295
Chat Box / Re: Quiz:"INTERNET"
Nov 11, 2008, 04:41 PM

Ajax quiz: Do you speak Geek?


ANSWER FOR 7

An application program interface (API - and sometimes spelled application programming interface) is the specific method prescribed by a computer operating system or by an application program by which a programmer writing an application program can make requests of the operating system or another application.

An API can be contrasted with a graphical user interface or a command interface (both of which are direct user interfaces) as interfaces to an operating system or a program.
#296
Chat Box / Re: Quiz:"INTERNET"
Nov 11, 2008, 04:41 PM

Ajax quiz: Do you speak Geek?


ANSWER FOR 6

Microsoft's ASP.NET AJAX Control Toolkit is as open source as Microsoft gets, as Scott Guthrie noted in his blog entry announcing the toolkit. The ASP.NET AJAX group will set up a source control repository where developers can report bugs or contribute their own controls, said Guthrie, who leads that development group.

There will also be regular binary drops. "This first release is just the beginning," Guthrie wrote. Microsoft's goal, he added, is to have the ASP.NET AJAX Control Toolkit contain "between 50-100 useful, high-quality Atlas controls over the next few months," Guthrie wrote.

The initial release consists of nine controls. Known issues exist for some of the controls.

# CascadingDropDown: This extender is attached to an ASP.NET DropDownList control. After a user makes a selection, the list calls back to a Web service to get data for the next DropDownList in the set.
# Collapsible Panel: This extender can be used with any ASP.NET Panel control. In addition, on client postback it automatically restores its client state.
# ConfirmButtonExtender: This catches clicks on a button-type class and displays a message to the end user.
# DragPanel: This functionality works with any ASP.NET panel and signifies the control as the so-called "drag handle."
# HoverMenu: Attachable to any ASP.NET WebControl, this extender associates that control to a pop-up panel, the position of which is specified by the developer.
More on ASP.NET AJAX development

Reference: Mini-Guide to Microsoft Atlas

News:Microsoft unleashes Atlas at MIX06
   

# PopupControl Extender: This can be added to any control in order to open a pop-up window. The window itself can support server-based processing and can contain ASP.NET server controls, HTML elements and other content types.
# ReorderList Control: This allows a user to change the order of a list simply by clicking on an item's control bar and moving it to the new spot. The control can also be bound to a data source, in which case it behaves like any other databound control.
# TextBoxWatermark Extendter: This ASP.NET TextBox control allows a TextBox to display information to end users in the form of a watermark based on a custom CSS style. The watermark disappears once the user starts typing.
# ToggleButton Extender: This CheckBox control allows a developer to use custom images to show the state of the CheckBox without affecting its behavior.

UPDATE: Vendors Telerik and ComponentArt have announced ASP.NET AJAX support in their control packages, Guthrie wrote here. In addition, Microsoft released four more controls:
# AlwaysVisibleControl: This extender, which applies to any ASP.NET control, keeps a control in the same position in a browser window as a user scrolls up and down.
# ModalPopup: In this extender, information like an "OK/Cancel" window is presented in a pop-up window that prevents users from interacting with the rest of the page.
# DropShadow: This applies a drop shadow to a panel.
# RoundedCorners: This applies rounded corners to a control.
#297
Chat Box / Re: Quiz:"INTERNET"
Nov 11, 2008, 04:39 PM

Ajax quiz: Do you speak Geek?


ANSWER FOR 5

Flash, a popular authoring software developed by Macromedia, is used to create vector graphics-based animation programs with full-screen navigation interfaces, graphic illustrations, and simple interactivity in an antialiased, resizable file format that is small enough to stream across a normal modem connection. The software is ubiquitous on the Web, both because of its speed (vector-based animations, which can adapt to different display sizes and resolutions, play as they download) and for the smooth way it renders graphics. Flash files, unlike animated but rasterized GIF and JPEG, are compact, efficient, and designed for optimized delivery.

Known as a do-it-yourself animation package, Flash 4 gives Web designers the ability to import artwork using whatever bitmap or illustration tool they prefer, and to create animation and special effects, and add sound and interactivity. The content is then saved as file with a .SWF file name extension.

Web users with Intel Pentium or Power Macintosh processors can download Flash Player to view Flash content, which performs across multiple browsers and platforms. Flash is lauded for being one of the Web's most accessible plug-in. According to an independent study cited by Macromedia, 89.9 percent of Web users already have Flash Player installed.
#298
Chat Box / Re: Quiz:"INTERNET"
Nov 11, 2008, 04:37 PM

Ajax quiz: Do you speak Geek?


ANSWER FOR 4

Safari is Apple Computer's Web browser . It is the default browser in Apple's OS X and is currently only available for that operating system. Safari was developed in-house by Apple and released in 2003.

Safari features tabbed browsing, similar to Firefox and Opera , RSS feed support and integration of Apple's Quicktime multimedia player. Safari also has a search field that uses Google's search engine . Apple's Keychain identify management scheme manages passwords. Other standard features include a pop-up ad blocker, spell check, bookmark management and integration with Apple's iWeb software.

Safari is based upon Apple's Webkit , an application framework based upon two open source framework s, WebCore and JavascriptCore . The source code for the non-rendering portions of Safari are all available at OpenDarwin.org.

Other Web browsers include Firefox , Internet Explorer , Opera and Mosaic , developed in 1993 and the original code base for Netscape's browser, Lynx .
#299
Chat Box / Re: Quiz:"INTERNET"
Nov 11, 2008, 04:35 PM
CHECK ANSWER FOR 2
#300
Chat Box / Re: Quiz:"INTERNET"
Nov 11, 2008, 04:32 PM

Ajax quiz: Do you speak Geek?


ANSWER FOR 2

Atlas was the code name for a free Web client framework from Microsoft that simplifies Web development by integrating client script libraries with the rich, server-based platform of ASP.NET 2.0. Atlas is now called ASP .NET AJAX. Simply put, Atlas allows Ajax functionality in Visual Studio. Designed to give developers a more structured environment for building web applications, Atlas will work on all modern browsers and with any Web server. The Atlas framework allows a developer to write Web applications that are DHTML-, JavaScript- and XML-intensive without significant expertise in any of these technologies.

The Atlas framework includes:

    * An object model.
    * Statement completion .
    * Debugging to speed development processes.
    * Automatic browser compatibility.
    * A consistent, object-oriented set of APIs for developing in JavaScript, including an extensible code framework that includes features like lifetime management, inheritance, multicast event handlers and interfaces.
    * Rich user interface controls, such as auto-complete textboxes, popup panels, animation, and drag and drop.
    * Server controls that automatically produce the client script needed for 'Atlas' applications eliminating the need to write JavaScript code.
    * Asynchronous calls to Web services.
    * A network stack that simplifies server connectivity and web services access.
    * A base class library that includes common features like rich string manipulation, timers, and running tasks.
    * A user interface framework that allows attachment of dynamic behaviors to HTML across browsers, addressing differing scripting behaviors found with cross-browser usage.

Atlas offers the same development platform for client-based web pages that ASP.NET offers for server-based pages, with full integration of server-based services. Significant portions of application processing are moved to the client while communication with the server is maintained in the background.

Atlas is a downloadable piece of JavaScript code and will work across any Web browser that supports AJAX technologies. It does not require any client installation at all, requiring only that the user simply include references to the correct script files in the page in development. Atlas may also be accessed through Microsoft's Visual Studio 2005 development tools.
#301
Chat Box / Re: Quiz:"INTERNET"
Nov 11, 2008, 04:30 PM

Ajax quiz: Do you speak Geek?


ANSWER FOR 1

Ajax (Asynchronous JavaScript and XML) is a method of building interactive applications for the Web that process user requests immediately. Ajax combines several programming tools including JavaScript, dynamic HTML (DHTML), Extensible Markup Language (XML), cascading style sheets (CSS), the Document Object Model (DOM), and the Microsoft object, XMLHttpRequest. Ajax allows content on Web pages to update immediately when a user performs an action, unlike an HTTP request, during which users must wait for a whole new page to load. For example, a weather forecasting site could display local conditions on one side of the page without delay after a user types in a zip code.

Google Maps is one well-known application that uses Ajax. The interface allows the user to change views and manipulate the map in real time. Ajax applications do not require installation of a plug-in, but work directly with a Web browser. Because of the technique's reliance on XMLHttpRequest, early applications worked only with Microsoft's Internet Explorer browser, but most other browsers now support Ajax.

Applications created with Ajax use an engine that acts as an intermediary between a user's browser and the server from which it is requesting information. Instead of loading a traditional Web page, the user's browser loads the Ajax engine, which displays the page the user sees. The engine continues to run in the background, using JavaScript to communicate with the Web browser. User input or clicking on the page sends a JavaScript call to the Ajax engine, which can respond instantly in many cases. If the engine needs additional data, it requests it from the server, usually using XML, while it is simultaneously updating the page.

Ajax is not a proprietary technology or a packaged product. Web developers have been using JavaScript and XML in combination for several years. Jesse James Garrett of the consultancy firm Adaptive Path is credited with coining the name "Ajax" as a shorthand way to refer to the specific technologies involved in a current approach.
#302
hi thiruvasagamani,

good post.I like to see ur updation in this post ie to update ur post by giving more information about this topic.

thanks keep posting...
#303
"uyir kappan thozhan"

He always take care of me.
#304
Chat Box / DO U AWARE OF "Word Scramble"!!!
Nov 11, 2008, 11:59 AM
Word scramble # 4: Web development

Need a little break from the monotony? Have a little fun while testing your Web development terminology out. Unscramble these 24 Web development-related words. Give it a try!

1. AVJA                                     
2. HTNI CARETIVL LEICS         
3. IAEGNERTTD E2JE                 
4. PEERWSEBH                           
5. ASVLIU EAG                           
6. AJVA RVRESE FSCEA       
7. EWB ECESSRVI           
8. BUEDG BWE ILNSIPAPTOCA 
9. EBCFEAW                 
10. CEDO TNEPSPIS         
11. DTXENDEE ATTAADME     
12. ECPFRRNEOAM
13. LSQ EEATSNTTM
14. UIDILBNG BJDC NTOOENPSMC
15. UTPUTO
16. LQS
17. VSPJACITRA
18. SREU RTANIECEF
19. LETRCCENIO ADAT GANEERCIHNT
20. TREOME ADABTASE SSCCAE
21. EWB UNARITTFUCERRS
22. IUNETMR NIMNNSROTEVE
23. BOCLO
24. THML 


Did you enjoy this puzzle?
#305
Chat Box / Re: Quiz:INTERNET
Nov 11, 2008, 11:50 AM
Quiz: Web Site Performance

1. This is something you use to manage the content of a Web site.
a. Webmaster
b. slave
c. Content Scrambling System
d. content management system

2. This service copies the pages of a Web site to geographically dispersed servers so that when a page is requested, content is sent to the user from the closest server, enabling faster delivery.
a. distributed computing
b. content delivery
c. fast packet technology
d. multicast

3. This is dividing the amount of work that a computer has to do between two or more computers so that more work gets done in the same amount of time and end users get served faster.
a. clustering
b. routing
c. load balancing
d. peering

4. On a Web site, this is a technique you might use to move visitors to a new Web page when a URL has been changed.
a. Uniform Resource Identifier
b. common gateway interface
c. redirection
d. active server page

5. This is a visual model of a Web site's content that allows the user to navigate through the site to find the information they are looking for.
a. site map
b. directory
c. image
d. model-view-controller

6. This is a hypertext link to a page on a Web site, other than its home page.
a. anchor
b. deep link
c. uplink
d. backlink

7. This is an application program that provides a way to look at and interact with all the information on the World Wide Web.
a. text editor
b. sprite
c. browser
d. sequencer

8. This is the business of housing, serving, and maintaining files for one or more Web sites.
a. colocation
b. hosting
c. infomediary
d. vertical portal

9. This is a Web site that allows registered users to upload files and save favorite bookmarks so that they can be accessed at any time from any computer on the Internet.
a. bookmark portal
b. roundtripping
c. jump page
d. blog

10. This is a place to store data temporarily. The files you automatically request by looking at a Web page are stored on your hard disk in this kind of subdirectory.
a. RAM
b. ROM
c. cache
d. capacitor
#306
Chat Box / Re: Quiz:INTERNET
Nov 11, 2008, 11:49 AM
Quiz: Web Services

1. This markup language is considered to be extensible because of its unlimited and self-defining markup symbols.
a. HTML
b. XHTML
c. XML
d. W3C

2. This lightweight protocol provides a way for programs to interact with each other, even if using different operating systems and located behind a firewall.
a. CORBA
b. SOAP
c. RMI
d. DCOM

3. This XML-based language is used to describe the services a business offers and to provide a way for individuals and other businesses to access those services electronically.
a. Xerces
b. X-Box
c. XUL
d. WSDL

4. This XML-based registry is intended as on online Internet registry for businesses worldwide.
a. Universal Plug and Play
b. UDDI
c. Uniform Resource Locator
d. UDF

5. This platform simplifies application development and decreases the need for programming and programmer training by creating standardized,reusable modular components.
a. GDMO
b. JES2
c. J2EE
d. JNDI

6. This method ensures that each XML element type and attribute name has a unique identity.
a. namespace
b. fully-qualified domain name
c. Multiprotocol Label Switching
d. named pipe

7. This is a data structure representing a service type in a Universal Description, Discovery, and Integration registry.
a. model-view-controller
b. tModel
c. Venn diagram
d. exploratory model

8. This application program interface (API) from Sun Microsystems supports messaging between computers in a network.
a. write once, read many
b. Short Message Service
c. Simple Mail Transfer Protocol
d. Java Message Service

9. This term encompasses the plans, methods, and tools aimed at modernizing,consolidating, and coordinating the computer applications in an enterprise.
a. EAI
b. EDI
c. grasping plan
d. decision support system

10. This XML extension is a standard way to describe how to transform the structure of an XML document into an XML document with a different structure.
a. extract, transform, load
b. tree structure
c. XSLT
d. phase change

#307
Chat Box / Re: Quiz:INTERNET
Nov 11, 2008, 11:48 AM
Quiz: Web Management Basics

1. This is a place to store the files for Web pages that are frequently requested (or that have been recently requested) to speed up page delivery and reduce network traffic.
a. buffer
b. capacitor
c. cache
d. incubator

2. This term means dividing the amount of work that a computer has to do between two or more computers so that more work gets done in the same amount of time and, in general, all users get served faster.
a. shared hosting
b. routing
c. load balancing
d. colocation

3. This is a program that serves the files that form Web pages to Web users. Every computer on the Internet that contains a Web site must have one of these.
a. Web server
b. autoresponder
c. application server
d. dynamic DNS service

4. This locates a specific page on the World Wide Web.
a. domain name
b. URL
c. path
d. IP address

5. This is programming that protects the resources of a private network from users from other networks.
a. cybernetics
b. firewall
c. server-side include
d. intranet

6. This is the set of markup symbols or codes inserted in a file intended for display on a World Wide Web browser page.
a. HTML
b. ASP
c. Java
d. GIF89a

7. This is a company that provides individuals and other companies access to the Internet and other related services such as Web site building and virtual hosting.
a. ISP
b. ASP
c. SAP
d. OSP

8. This is an application program that provides a way to look at and interact with all the information on the World Wide Web.
a. link checker
b. browser
c. access provider
d. avatar

9. In the Web hosting business, this refers to the rental and exclusive use of a computer that includes a Web server, related software, and connection to the Internet, housed in the Web hosting company's premises.
a. colocation
b. reseller hosting
c. virtual hosting
d. dedicated hosting

10. Using a World Wide Web browser, this is a saved link to a Web page that has been added to a list of saved links.
a. blog
b. bookmark
c. bookmark portal
d. bogie
#308
Chat Box / Re: Quiz:INTERNET
Nov 11, 2008, 11:47 AM
Quiz: Netiquette -- Are you an Internet savage?

1. You've been sent a virus warning, what should you do now?
a. Forward it to everyone in your address book.
b. Forward it within your company.
c. Ignore it.
d. Go to a security Web site to learn if it is a real virus.
Answer

2. On the Internet, flaming refers to:
a. forwarding risque e-mails
b. stalking a romantic interest in chat rooms
c. giving someone a verbal lashing in public
Answer

3. The use of "Bcc" when sending an e-mail note could sometimes be resented by the note's explicit recipients. What does the use of "Bcc" allow you to do?
Answer

4. Sending UBE is very much frowned upon. What does UBE stand for?
a. unsolicited bulk e-mail
b. unwanted boring emoticons
c. unzipped big e-mails
Answer

5. Your cousin asked for your fabulous zucchini cake recipe at the last family function. While you're sending it to him, you decide to e-mail it to all 500 people in your address book as well. What major netiquette sin have you committed?
Answer

6. Lurking is sometimes considered impolite. It is the practice of:
a. reading discussions without contributing to them
b. spending too much time in chat rooms
c. reading e-mail meant for someone else
Answer

7. If there is no copyright notice, it's okay to copy a Web page. True or false?
Answer

8. This term describes the use of e-mail, instant messaging, chat rooms, pagers, cell phones, or other forms of information technology to deliberately harass, threaten, or intimidate someone. What is it?
Answer

9. In electronic communication, "brb" is a quick way of saying:
a. Be right back.
b. Been real busy.
c. Been real, buddy.
Answer

10. As a common courtesy, when in a chat room you should:
a. introduce yourself when you enter a room
b. make it clear when you are directing a question or response to a specific user
c. report disruptive users
d. all of the above
Answer
#309
Chat Box / Re: Quiz:INTERNET
Nov 11, 2008, 11:45 AM
Quiz: In the Spammer's Lair

How many can you guess without peeking? Quiz yourself and find out!

1. This is a program that automatically trolls the Internet for e-mail addresses.
See answer.


2. This is an SMTP e-mail server that allows third-party relay of e-mail messages.
See answer.


3. Spammers use this to make it look like you sent spam to yourself -- knowing that most people can't resist checking to see who else has the same name they do.
See answer.


4. This German word is used to describe an intentionally slow server that's set up to trap spammers.
See answer.


5. This is an Internet service provider that doesn't care if their members distribute spam.
See answer.


6. This is the legal term for commercial e-mail messages sent without the consent of the user.
See answer.


7. Spammers can use this technique to alter an e-mail header and make it look like the message came from just about anyone.
See answer.


8. In this type of attack, often carried out as an act of revenge against someone who's reported a spammer, the spammer sends out huge volumes of spam that appear to be from the person who reported him.
See answer.


9. This is a Web marketing term for e-mail that recipients have previously requested by signing up at a Web site or special ad banner. It is not spam. What is it?
See answer.


10. This is a text segment interjected into an e-mail address to foil a program that a spammer uses to troll the Internet seeking e-mail addresses.
See answer.
#310
Chat Box / Re: Quiz:INTERNET
Nov 11, 2008, 11:45 AM
Quiz: E-business trends and technologies

1.) This Web site feature involves tailoring pages to individual users' characteristics or preferences.
a. Digital Silhouettes
b. customer relationship management
c. Platform for Privacy Preferences
d. clickstream analysis
e. personalization

2.) This popular online payment service is owned by eBay.
a. Multics
b. PayPal
c. P2P
d. Majordomo
e. cache

3.) This is an industry term used to describe the progression of steps a customer goes through when considering, purchasing, using, and maintaining loyalty to a product or service.
a. collocation
b. pervasive computing
c. customer life cycle
d. decision support system
e. predication

4.) This Internet business model generates revenue by offering pay-per-view Web pages, Web links, or Web services for small amounts of money.
a. eCash
b. micropayment
c. smart card
d. electronic bill presentment and payment
e. Electronic Funds Transfer

5.) This approach to understanding customer behavior involves the integration of information gathered by traditional data mining techniques with information gathered over the World Wide Web.
a. OLAP
b. enterprise resource management
c. Web mining
d. business intelligence
e. knowledge management

6.) This industry initiative, headed by Microsoft, was created to promote Extensible Markup Language (XML) as the common data exchange language for e-commerce.
a. BizTalk
b. ebXML
c. OASIS
d. NewsML
e. e-inclusion

7.) This is a method for business-to-business purchase and sale of supplies and services over the Internet.
a. supplier relationship management
b. e-tailing
c. e-procurement
d. enterprise resource management
e. supply chain management

8.) This type of Internet business charges individuals or enterprises an access fee for applications and related services that would otherwise have to be located in their own personal or enterprise computers.
a. Web services
b. metered services
c. knowledge warehouse
d. application service provider
e. Internet service provider

9.) This XML-based protocol is intended to serve as a standard for managing complex business-to-business (B2B) transactions among multiple organizations.
a. Information and Content Exchange
b. Business Transaction Protocol
c. Service Location Protocol
d. Network Data Management Protocol
e. Lightweight Directory Access Protocol

10.) This is an industry term for software that analyzes data about customers to develop a better understanding of the customer and how the customer is using a company's products and services.
a. content aggregator
b. adware
c. spyware
d. Fourier analysis
e. enterprise relationship management
#311
Chat Box / Re: Quiz:INTERNET
Nov 11, 2008, 11:43 AM
Do you speak Geek: Internet Protocols and Technologies

1. Which of these activities is still the most common use of the Internet?
a. Looking up a map or driving directions
b. Using a search engine to find information
c. Sending or reading e-mail
d. Checking the weather
Answer

2. To surf the Web, you'll need several basic building blocks: a personal computer or mobile handset, an Internet connection and a Web browser. Where you go is up to you. Which of the following will not appear in the address bar of your browser?
a. a URL
b. a domain name
c. the letters HTTP
d. HTML code
Answer

3. The development of the TCP/IP protocols in the 1970s made it possible to expand the size of the ARPANET. Which key additions in the early 1990s helped to make the Internet browsable by more than professors at universities and the Department of Defense?
a. XML and Firefox
b. HTML and Mosaic
c. RSS and wikis
d. CSS and SSL
Answer

4. "Web 2.0" is a much-used buzzword these days in online business circles, used to describe user-generated content, like blogs, podcasts, mashups, wikis and social bookmarking, and rich Internet applications (RIAs) based upon technologies like Ajax. Is Internet2 the same thing as Web 2.0?
a. True! Internet2 is just another way of referring to that group of technologies.
b. False! Internet2 is a non-profit consortium that has nothing to do with the O'Reilly Web 2.0 Conference.
Answer

5. As the Internet has matured, organizations have found they need effective means to prevent outsiders from accessing private data resources and for controlling which outside resources their own users have access to.Which of the following technologies offer this kind of protection?
a. DMZ
b. firewall
c. HTTPS
d. a & b
Answer

6. Advances in wireless technology like wireless mesh networks, wireless broadband, WiMax, 3G and muni-WiFi have brought online connections to more people in more places that ever before. What language is used to translate data into a format that mobile devices on those networks can interpret properly?
a. XML
b. Java
c. J2ME
d. All of the above
Answer

7. Which of the following is NOT used in sending messages over the Internet?
a. DIME
b. LIME
c. MIME
d. SOAP
Answer

8. The development, sharing and adoption of open source technologies and protocols have been key to the development of the Internet. Which of the following is not open source?
a. Firefox
b. Linux
c. Atom
d. Solaris
e. Apache
Answer

9. The so-called "well-known" port numbers are reserved for assignment by ICANN for use by the application end points that use TCP or the UDP. What are the other kinds of ports?
a. registered and dynamic ports
b. defined and variable ports
c. canonical and free ports
d. definitive and radical ports
Answer

10. How long is a Web year?
Answer
#312
Chat Box / Quiz:"INTERNET"
Nov 11, 2008, 11:42 AM
Ajax quiz: Do you speak Geek?

1. What combination of technologies gives AJAX its name?
A. ASP and XAML
B. Asynchronous JavaScript and XML
C. Autonomic Computing and DHTML
D. Atlas and XML
Answer

2. Which one of these legendary Greek mythical figures or places is the code name for Microsoft's version of AJAX ?
A. Oracle
B. Atlas
C. Hercules
D. Delphi
Answer

3. Whoops! Stop the presses! The answer to Question #2 has expired already. What has Microsoft renamed its free Web client framework?
A. MSN AJAX
B. Live ASP
C. ASP.NET AJAX
D. .NET Designer
Answer

4. Which Web browser is the least optimized for Microsoft's version of AJAX?
A. Firefox
B. Opera
C. Safari
D. Internet Explorer
Answer

5. Which one of these technologies is NOT used in AJAX?
A. CSS
B. DOM
C. DHTML
D. Flash
Answer

6. Microsoft has released a control toolkit for developers. Is it open source?
Answer

7. AJAX has been used by developers worldwide to create mashups , combinations of databases of publicly available information from Amazon.com, Craigslist, eBay, Google Maps and others. What's the most important element for a developer to create a mashup?
Answer

8. Which one of the following functionalities is not (currently) made possible by AJAX?
A. Drag 'n drop of objects
B. Dropdown menus
C. Symbian browser support
Answer
( Hint: Scroll down to the second-to-last paragraph for the answer. )

9. Which programming language used in Visual Studio shares its name with a musical note?
Answer
#313
Chat Box / Re: Quiz:OPERATING SYSTEMS
Nov 11, 2008, 11:40 AM
How do you measure up on our Windows geek-o-meter?

1. Changing the colors of shopping
This is a is a programmable card that can represent each of the owner's credit, debit, and customer cards as required, making it unnecessary to carry all of the aforementioned. Working in conjunction with a small handheld device called the Pocket Vault, this has security features that guard against identity theft, physical theft of cards, and theft of credit card information over the Internet. The device also has built in radio frequency identification (RFID) technology and the capacity to display a user's photo.
What is it?

2. Causing someone else to crash
Also known as a "WinNuke," this is a technique for causing the Windows operating system of someone you're communicating with to crash or suddenly terminate.
What is it?

3. A rectangular shaped server
This term refers to the shape of a computer server enclosed in a rectangular and horizontally-arranged chassis and often installed in a rack with similar servers.
What is it?

4. Welcome to our world
This is a simple program that has long been the new programmer's induction into the world of programming languages. A project at the Association for Computing Machinery (ACM) of Louisiana Tech is collecting all these types of program examples they can find -- currently they've got 204.
What is it?

5. Vulcan nerve pinch
It is the reboot key combination sometimes referred to as a "three-fingered salute" (to Microsoft's Bill Gates) or as the "Vulcan nerve pinch" (a Star Trek reference).
What is it?

6. A drive-by download to teach a lesson
Initially carried out to illustrate the problem of lax security, this was launched six months after Microsoft released a patch for the flaw. Like its malicious counterpart, it could propagate across networks exponentially and perform its tasks without user knowledge or consent, through a process sometimes called a drive-by download. According to some, such invasive behavior is warranted because many system administrators fail to install appropriate patches and service packs, despite knowledge of vulnerabilities and available solutions.
What is it?

7. Framework for MS compound doc technology
This is Microsoft's framework for a compound document technology. Part of Microsoft's ActiveX technologies, this takes advantage and is part of a larger, more general concept, the Component Object Model (COM) and its distributed version, DCOM.
What is it?

8. (ANSI) standard electronic interfaces
This is a set of evolving American National Standards Institute standard electronic interfaces that allow personal computers to communicate with peripheral hardware such as disk drives, tape drives, CD-ROM drives, printers, and scanners faster and more flexibly than previous interfaces. These ports are built into most personal computers today and supported by all major operating systems.
What is it?

9. The world's first popular PC
This was the world's first personal computer to attract a substantial number of users. It appeared on the cover of the January 1975 issue of Popular Electronics. A company called MITS developed it and it sold for $395 as a kit or $495 assembled.
What is it?

10. Hot girl or viral worm?
This is a viral worm that uses the lore of a beautiful woman to infect Windows systems. When a user unwittingly opens an e-mail note with an attachment that appears to be a graphic image of a certain babe, the worm to copies itself to the Windows directory and then sends the file as an attachment to all addresses in your address book.
What is it?

11. Paper or PC?
This invention, credited to Alan Kay of Xerox, who sketched out the idea in 1971, is similar in size and thickness to a yellow paper notepad and is intended to function as the user's primary PC as well as a note-taking device.
What is it?

12. Search in "your past"
This is a search approach Microsoft is reportedly considering for Longhorn that allows a Windows user to quickly locate any item of information the user has previously created or read, whether in e-mail, address books, Web pages, or office documents, all from a single search box built into the task bar.
What is it?

13. Windows Word Challenge: Sounds like a Star Wars character, but it's not
This is a customized image that Microsoft Internet Explorer uses as an icon to go with a user-specified bookmarked site on the Links bar at the top of a Web browser window.
What is it?

14. OLE! Getting rid of jargon and fuzz
Developed by Deloitte Consulting, this software application searches documents for jargon, overworked terms and unnecessarily complicated sentences. The program can be run in Microsoft Word or PowerPoint on Office 2000 or XP systems.
What is it?

15. IM spam
According to a report from Ferris Research, 500 million IM spam messages were sent in 2003, twice the level of 2002. As it becomes more prevalent, it could impact the business community similarly to the way that spam e-mail does now, by consuming corporate resources and creating security problems. Think you know the term for IM spam?
What is it?
#314
Chat Box / Quiz:OPERATING SYSTEMS
Nov 11, 2008, 11:34 AM
quiz:IIS 6 Administration

1. What's a good way to ensure your paging file doesn't become fragmented?

a. Make the paging file size dynamic.
b. Make the paging file size static.
c. Make the paging file large and keep it on a single drive.
d. Install MPDFRG.EXE and set it to run automatically.

2. By default, the number of active connections in the queue waiting for server attention is 25. During heavy load, you can increase this to...

a. 50
b. 64
c. 80
d. 128

3. This is NOT a good trick for improving performance:

a. Minimize FTP user isolation.
b. Use ISAPI extensions instead of ISAPI filters.
c. Set up remote virtual directories.
d. Keep websites and FTP servers on different machines.

4. IIS supports how many concurrent CGI applications by default?

a. 2
b. 4
c. 6
d. 7

5. IIS has a feature for monitoring the health of multiple worker processes servicing an application pool called...

a. HTTP keep-alive
b. IIS monitoring services
c. Application failsafe
d. Rapid-fail protection

6. When looking at the Memory:pages/sec-counter, a number under 20 indicates...

a. Everything is just fine and dandy; have some coffee and relax.
b. You need more RAM.
c. Compare the number to the network card bandwidth to locate possible bottlenecks.
d. Increase the cache allotment.

7. This tool simulates multiple browsers simultaneously connecting to IIS to get content or run apps:

a. Web Application Stress Tool
b. Microsoft Operations Manager
c. Traffic Volume Manager Tool
d. Microsoft Traffic Management Tool

8. HTTP compression only works with web browsers developed after...

a. 1996
b. 1997
c. 1998
d. 1999

9. Application pool settings do NOT apply to this type of applications...

a. ISAPI
b. CGI
c. ASP
d. ASP.NET

10. This is NOT a good way to boost ASP.NET application performance:

a. Trap exceptions instead of using them to direct program flow.
b. Disable session state, unless you actively plan to use it.
c. Use storied procedures instead of ad hoc queries when accessing back-end SQL data.
d. Never leave caching turned on.
#315
Chat Box / Re: Quiz:"WIRELESS & MOBILE"
Nov 11, 2008, 11:18 AM
Quiz: Wireless Standards and Protocols

Answer key: 1b, 2c, 3b, 4c, 5d, 6a, 7c, 8a, 9a, 10d
#316
Chat Box / Re: Quiz:"WIRELESS & MOBILE"
Nov 11, 2008, 11:17 AM
Wireless networking (CWNA)

ANSWERS

1. C

2. B

3. A

4. B

5. B

6. D

7. A

8. C

9. B

10. E

11. A

12. B

13. D
#317
Chat Box / Re: Quiz:"WIRELESS & MOBILE"
Nov 11, 2008, 11:08 AM
Quiz: Wireless LANs

ANSWER FOR 10

In security, an evil twin is a home-made wireless access point that masquerades as a legitimate hot spot to gather personal or corporate information without the end-user's knowledge.

It's fairly easy for an attacker to create an evil twin, simply by using a mobile Internet device -- such as a laptop or smartphone -- and some readily-available software. The attacker positions himself in the vicinity of a legitimate Wi-Fi access point and lets his Internet device discover what name (SSID) and radio frequency the legitimate access point uses. He then sends out his own radio signal, using the same name.

To the end-user, the evil twin looks like a hot spot with a very strong signal; that's because the attacker has not only used the same network name and settings as the "good twin" he is impersonating, he has also physically positioned himself near the end-user so that his signal is likely to be the strongest within range. If the end-user is tempted by the strong signal and connects manually to the evil twin to access the Internet, or if the end-user's computer automatically chooses that connection because it is running in promiscuous mode, the evil twin becomes the end-user's Internet access point, giving the attacker the ability to intercept sensitive data such as passwords or credit card information.

Evil twins are not a new phenomenon in wireless transmission. Historically they have been called base station clones or honeypots. What's different now is that more businesses and consumers are using wireless devices in public places and it's easier than ever for someone who doesn't have any technical expertise to create an evil twin. To protect yourself from evil twin network connections, experts recommend that you only use public hot spots for Web browsing and refrain from shopping or banking. To protect corporate data, experts recommend that when wireless, you only connect to the Internet through a VPN and always use WEP or WPA encryption.
#318
Chat Box / Re: Quiz:"WIRELESS & MOBILE"
Nov 11, 2008, 11:07 AM
Quiz: Wireless LANs

ANSWER FOR 9

A wireless Internet service provider (WISP) is an Internet service provider (ISP) that allows subscribers to connect to a server at designated hot spots (access points) using a wireless connection such as Wi-Fi. This type of ISP offers broadband service and allows subscriber computers, called stations, to access the Internet and the Web from anywhere within the zone of coverage provided by the server antenna. This is usually a region with a radius of several kilometers.

The simplest WISP is a basic service set (BSS) consisting of one server and numerous stations all linked to that server by wireless. More sophisticated WISP networks employ the extended service set (ESS) topology, consisting of two or more BSSs linked together at access points (APs). Both BSS and ESS are supported by the IEEE 802.11b specification.

One example of a WISP is T-Mobile, which provides access to wireless laptop users in the 2,000 plus chain of Starbucks coffee houses.
#319
Chat Box / Re: Quiz:"WIRELESS & MOBILE"
Nov 11, 2008, 11:06 AM
Quiz: Wireless LANs

ANSWER FOR 8

Fixed wireless refers to the operation of wireless devices or systems in fixed locations such as homes and offices. Fixed wireless devices usually derive their electrical power from the utility mains, unlike mobile wireless or portable wireless which tend to be battery-powered. Although mobile and portable systems can be used in fixed locations, efficiency and bandwidth are compromised compared with fixed systems. Mobile or portable, battery-powered wireless systems can serve as emergency backups for fixed systems in case of a power blackout or natural disaster.

The technology for wireless connection to the Internet is as old as the Net iteself. Amateur radio operators began "patching" into telephone lines with fixed, mobile, and portable two-way voice radios in the middle of the 20th Century. A wireless modem works something like an amateur-radio "phone patch," except faster. High-end fixed wireless employs broadband modems that bypass the telephone system and offer Internet access hundreds of times faster than twisted-pair hard-wired connections or cell-phone modems.

Some of the most important assets of fixed wireless are as follows.

    * Subscribers can be added or moved (to a certain extent) without modifying the infrastructure.
    * Subscribers in remote areas can be brought into a network without the need for stringing new cables or optical fibers across the countryside.
    * Broad bandwidth is possible because there are no wires or cables to introduce reactance into the connection (reactance limits bandwidth by preventing signals higher than a certain frequency from efficiently propagating).
    * As the number of subscribers increases, the connection cost per subscriber goes down.
#320
Chat Box / Re: Quiz:"WIRELESS & MOBILE"
Nov 11, 2008, 11:06 AM
Quiz: Wireless LANs

ANSWER FOR 7

In a wireless local area network (WLAN), an access point is a station that transmits and receives data (sometimes referred to as a transceiver). An access point connects users to other users within the network and also can serve as the point of interconnection between the WLAN and a fixed wire network. Each access point can serve multiple users within a defined network area; as people move beyond the range of one access point, they are automatically handed over to the next one. A small WLAN may only require a single access point; the number required increases as a function of the number of network users and the physical size of the network.
#321
Chat Box / Re: Quiz:"WIRELESS & MOBILE"
Nov 11, 2008, 11:06 AM
Quiz: Wireless LANs

ANSWER FOR 6

A transponder is a wirelesscommunications, monitoring, or control device that picks up and automatically responds to an incoming signal. The term is a contraction of thewords transmitter and responder. Transponders can be eitherpassive or active.

A passive transponder allows a computer or robot to identify an object. Magnetic labels, such as those on credit cards and store items, are commonexamples. A passive transponder must be used with an active sensor that decodes andtranscribes the data the transponder contains. The transponder unit can bephysically tiny, and its information can be sensed up to several feet away.

Simple active transponders are employed in location, identification, andnavigation systems for commercial and private aircraft. An example is an RFID (radio-frequency identification) devicethat transmits a coded signal when it receives a request from a monitoring or controlpoint. The transponder output signal is tracked, so the position of the transpondercan be constantly monitored. The input (receiver) and output (transmitter) frequencies are preassigned. Transpondersof this type can operate over distances of thousands of miles.

Sophisticated active transponders are used in communications satellites and on board space vehicles. They receive incoming signals over a range, or band, of frequencies, and retransmit thesignals on a different band at the same time. The device is similar to a repeater of the sort used in land-based cellulartelephone networks. The incoming signal, usually originating from a point on theearth's surface, is called the uplink. The outgoing signal, usually sent toa point or region on the surface, is the downlink. These transponderssometimes operate on an interplanetary scale.
#322
Chat Box / Re: Quiz:"WIRELESS & MOBILE"
Nov 11, 2008, 11:05 AM
Quiz: Wireless LANs

ANSWER FOR 5

MIMO (multiple input, multiple output) is an antenna technology for wireless communications in which multiple antennas are used at both the source (transmitter) and the destination (receiver). The antennas at each end of the communications circuit are combined to minimize errors and optimize data speed. MIMO is one of several forms of smart antenna technology, the others being MISO (multiple input, single output) and SIMO (single input, multiple output).

In conventional wireless communications, a single antenna is used at the source, and another single antenna is used at the destination. In some cases, this gives rise to problems with multipath effects. When an electromagnetic field (EM field) is met with obstructions such as hills, canyons, buildings, and utility wires, the wavefronts are scattered, and thus they take many paths to reach the destination. The late arrival of scattered portions of the signal causes problems such as fading, cut-out (cliff effect), and intermittent reception (picket fencing). In digital communications systems such as wireless Internet, it can cause a reduction in data speed and an increase in the number of errors. The use of two or more antennas, along with the transmission of multiple signals (one for each antenna) at the source and the destination, eliminates the trouble caused by multipath wave propagation, and can even take advantage of this effect.

MIMO technology has aroused interest because of its possible applications in digital television (DTV), wireless local area networks (WLANs), metropolitan area networks (MANs), and mobile communications.
#323
Chat Box / Re: Quiz:"WIRELESS & MOBILE"
Nov 11, 2008, 11:04 AM
Quiz: Wireless LANs

ANSWER FOR 4

SWAN (Structured Wireless-Aware Network) is a technology that incorporates a wireless local area network (wireless LAN or WLAN) into a wired wide-area network (WAN). The technology, developed by Cisco Systems, makes it possible for a wireless LAN to operate as a seamless extension of a wired network. As a result, an existing wired network can be made to serve hundreds of users, organizations, corporations, or agencies over a large geographic area.

A SWAN is said to be scalable, secure, and reliable. Special features include centralized management, simplified deployment, security policy monitoring, rogue access point detection and location, interference-source detection and location, radio-frequency (RF) scanning and monitoring, enhanced fault monitoring and troubleshooting tools, and fault tolerance.
#324
Chat Box / Re: Quiz:"WIRELESS & MOBILE"
Nov 11, 2008, 11:03 AM
Quiz: Wireless LANs

ANSWER FOR 3

HiperLAN is a set of wireless local area network (WLAN) communication standards primarily used in European countries. There are two specifications: HiperLAN/1 and HiperLAN/2. Both have been adopted by the European Telecommunications Standards Institute (ETSI).

The HiperLAN standards provide features and capabilities similar to those of the IEEE 802.11 wireless local area network (LAN) standards, used in the U.S. and other adopting countries. HiperLAN/1 provides communications at up to 20 Mbps in the 5-GHz range of the radio frequency (RF) spectrum. HiperLAN/2 operates at up to 54 Mbps in the same RF band. HiperLAN/2 is compatible with 3G (third-generation) WLAN systems for sending and receiving data, images, and voice communications. HiperLAN/2 has the potential, and is intended, for implementation worldwide in conjunction with similar systems in the 5-GHz RF band.
#325
Chat Box / Re: Quiz:"WIRELESS & MOBILE"
Nov 11, 2008, 11:02 AM
Quiz: Wireless LANs

ANSWER FOR 2

The term microwave refers to electromagnetic energy having a frequency higher than 1 gigahertz (billions of cycles per second), corresponding to wavelength shorter than 30 centimeters.

Microwave signals propagate in straight lines and are affected very little by the troposphere. They are not refracted or reflected by ionized regions in the upper atmosphere. Microwave beams do not readily diffract around barriers such as hills, mountains, and large human-made structures. Some attenuation occurs when microwave energy passes through trees and frame houses. Radio-frequency (RF) energy at longer wavelengths is affected to a lesser degree by such obstacles.

The microwave band is well suited for wireless transmission of signals having large bandwidth. This portion of the RF electromagnetic radiation spectrum encompasses many thousands of megahertz. Compare this with the so-called shortwave band that extends from 3 MHz to 30 MHz, and whose total available bandwidth is only 27 MHz. In communications, a large allowable bandwidth translates into high data speed. The short wavelengths allow the use of dish antennas having manageable diameters. These antennas produce high power gain in transmitting applications, and have excellent sensitivity and directional characteristics for reception of signals.
#326
Chat Box / Re: Quiz:"WIRELESS & MOBILE"
Nov 11, 2008, 11:01 AM
Quiz: Wireless LANs

ANSWER FOR 1

IR wireless

IR wireless is the use of wireless technology in devices or systems that convey data through infrared (IR) radiation.  Infrared is electromagnetic energy at a wavelength or wavelengths somewhat longer than those of red light.  The shortest-wavelength IR borders visiblered in the electromagnetic radiation spectrum;the longest-wavelength IR borders radio waves.

Some engineers consider IR technology to be a sub-specialty of optical technology.  The hardware is similar, and the two forms of energy behave in much the same way.  But strictly speaking, "optical" refers to visibleelectromagnetic radiation, while "infrared" is invisible to the unaidedeye.  To compound the confusion, IR is sometimes called "infrared light."

IR wireless is used for short- and medium-range communications andcontrol.  Some systems operate in line-of-sight mode; this means that theremust be a visually unobstructed straight line through space between the transmitter(source) and receiver (destination).  Other systems operate in diffuse mode,also called scatter mode.  This type of system can function when the sourceand destination are not directly visible to each other.  An example is a televisionremote-control box.  The box does not have to be pointed directly at the set,although the box must be in the same room as the set, or just outside the room with thedoor open.

IR wireless technology is used in intrusion detectors; home-entertainment control units; robot control systems; medium-range, line-of-sight laser communications; cordless microphones, headsets, modems, and printers and other peripherals.

Unlike radio-frequency (RF) wireless links, IR wireless cannot passthrough walls.  Therefore, IR communications or control is generally not possible between different rooms in a house, or between different houses in a neighborhood (unless they have facing windows).  This might seem like a disadvantage, but IR wireless is more private than RF wireless.  Some IR wireless schemes offer a level of securitycomparable to that of hard-wired systems.   It is difficult, for example, toeavesdrop on a well-engineered, line-of-sight, IR laser communications link.
#327
Chat Box / Re: Quiz:"WIRELESS & MOBILE"
Nov 11, 2008, 10:58 AM
Quiz: Wireless

ANSWER KEY: 1b;2d;3e;4b;5a;6c;7a;8b;9e;10a
#328
Chat Box / Re: Quiz:"WIRELESS & MOBILE"
Nov 11, 2008, 10:56 AM
quiz: Mobile CRM vendors

Correct answers:

Question #1: A

Question #2: A

Question #3: A

Question #4: C

Question #5: D

Question #6: A

Question #7: C

Question #8: D

Question #9: C

Question #10: B
#329
Chat Box / Re: Quiz:"WIRELESS & MOBILE"
Nov 11, 2008, 10:52 AM
hi sankarakrishnan,

answer will be updated...sorry for the delay... i am back to continue it...your suggestions are valid, in future i will try to implement that[try to avoid vast question pattern],k...

thanks acumen.
#330
Chat Box / Re: Quiz:"WIRELESS & MOBILE"
Nov 10, 2008, 08:47 PM
Quiz: Wireless Standards and Protocols

1. This is the family of specifications for wireless local area networks (WLANs) developed by a working group of the Institute of Electrical and Electronics Engineers (IEEE).
a. 3G
b. 802.11
c. 802.3
d. 802.5

2. Which of the following refers to a standard or group of standards that are still being developed as a part of overall IEEE 802.11 WLAN support?
a. 802.11x
b. 802.11i
c. Both of the above.
d. Neither of the above.

3. Which of the following refers to a communications specification that was approved in early 2002 by the Institute of Electrical and Electronics Engineers Standards Association (IEEE-SA) for wireless personal area networks (WPANs)?
a. 802.11a
b. 802.15
c. 802.11b
d. None of the above.

4. Which of the following is a language that allows the text portions of Web pages to be presented on cellular telephones and personal digital assistants (PDAs) via wireless access?
a. HDML
b. Wireless Markup Language
c. Both of the above.
d. Neither of the above.

5. Developed by International Telecommunication Union (ITU), ______ is a code-division multiple access (CDMA) version of the IMT-2000 standard.
a. CDMA
b. WCDMA
c. CMYK
d. CDMA2000

6. This is an industry specification that describes how mobile phones, computers, and PDAs can easily interconnect with each other using a short-range wireless connection.
a. Bluetooth
b. EMI
c. D-AMPS
d. IrDA

7. Which of the following is a faster version of GSM wireless service, designed to deliver data at rates up to 384 Kbps and enable the delivery of multimedia and other broadband applications to mobile phone and computer users?
a. ESMR
b. BREW
c. EDGE
d. ETRN

8. _________ is a security protocol designed to provide a wireless LAN with a level of security and privacy comparable to what is usually expected of a wired LAN.
a. WEP
b. 802.11x
c. RMON
d. LDAP

9. This is a specification for a set of communication protocols to standardize the way that wireless devices can be used for Internet access.
a. WAP
b. WAX
c. VSAT
d. TETRA

10. This is the handling of voice, fax, and regular text messages as objects in a single mailbox that a user can access either with a regular e-mail client or by telephone.
a. Short Message Service
b. short messaging
c. UMTS
d. unified messaging
#331
Chat Box / Re: Quiz:"WIRELESS & MOBILE"
Nov 10, 2008, 08:46 PM
Wireless networking (CWNA)

1. 802.11 wireless networking uses what method as the media access method?

a. CSMA/CD
b. CTS/RTS
c. CSMA/CA
d. CSCD/CA

See an unfamiliar term?
Look it up in our SearchNetworking.com glossary, courtesy of Whatis.com.
   
2. 802.11 legacy specifies data rates of what?

a. 11 Mbps
b 1 & 2Mbps
c. 5 Mbps
d. 54 Mbps

3. What modulation technique does 802.11b wireless use?

a. DSSS
b. FDSS
c. FMDS
d. OFDM

4. 802.11g is downward compatible to what?

a. 802.11a
b. 802.11b
c. 802.11i
d. 802.11n

5. In the USA, how many channels are available for 802.11b/g wireless networking?

a. 13
b. 11
c. 5
d. 15
e. 30

6. When using 802.11b/g, what three channels would have the least interference?

a. 1, 2 & 3
b. 2, 6 & 8
c. 1, 5 & 13
d. 1,6 & 11
e. By putting them all on the same channel, there will be no interference

7. 802.11a runs on what frequency?

a. 5Ghz
b. 2.4Ghz
c. 4.8Ghz
d. 3.6Ghz

8. 802.11i provides what?

a. Quality of service
b. Double the speed
c. Additional security
d. Extensions for Japan
e. Fast Roaming

9. WEP stands for what?

a. Wired equivalency protocol
b. Wired equivalent privacy
c. Wireless encryption protocol
d. Wireless equivalent privacy

10. 802.11i is the same as what?

a. WPA
b. WEP
c. 802.11g
d. IPSEC
e. WPA2

11. WPA2 uses what, instead of RC4, used by WEP and WPA?

a. AES
b. RC4
c. RC3
d. 3DES

12. 802.11a offers greater speed than 802.11b but offers less what?

a. speed
b. distance
c. channels
d. security

13. What device is the wireless equivalent of a wired hub?

a. bridge
b. repeater
c. antenna
d. Access-point
e. router
#332
Chat Box / Re: Quiz:"WIRELESS & MOBILE"
Nov 10, 2008, 08:45 PM
Quiz: Wireless LANs

1. IR wireless communications transmit data using electromagnetic energy at a wavelength or wavelengths somewhat longer than those of red light. What does "IR" stand for?
Answer

2. This term describes electromagnetic energy having a frequency higher than 1 gigahertz, corresponding to wavelength shorter than 30 centimeters. (Hint: it has a common use in many homes that's not related to communications.) What is it?
Answer

3. HiperLAN is a set of WLAN communication standards that provide features and capabilities similar to those of the IEEE 802.11 standards. Where is it primarily used?
a. Japan
b. Europe
c. India
Answer

4. SWAN is a technology that incorporates a wireless LAN into a wired wide-area network (WAN). What does "SWAN" stand for?
a. Structured Wireless-Aware Network
b. Switching for Wired Area Network
c. Structured Wireless Area Network
d. Switched Wireless Area Network
Answer

5. MIMO is an antenna technology for wireless communications that features a single antenna at the source end and a single antenna at the destination end. True or false?
Answer

6. From what two terms is the word transponder derived?
Answer

7. Abbreviated as AP, this is the more formal name for a hot spot. What is it?
Answer

8. Do fixed wireless devices usually derive their electrical power from utility mains or batteries?
Answer

9. A WASP is a wireless application service provider. What's a WISP?
Answer

10. Spock had one of these from the Star Trek mirror universe -- in a WLAN context, it describes a counterfeit access point. What is it?
Answer
#333
Chat Box / Re: Quiz:"WIRELESS & MOBILE"
Nov 10, 2008, 08:43 PM
Quiz: Wireless

1. This is a mobile positioning technique used by emergency servicesto find a caller's location.
a. X and Y coordinates
b. Cell of Origin
c. location-based services
d. automatic vehicle locator
e. Interactive Voice Response

2.This takes the entire allocated frequency range for a given service and multiplexes information for all users across the spectrum range at the same time in order to optimize bandwidth.
a. dynamic multi-pathing
b. time division multiple access
c. single mode fiber
d. code-division multiple access
e. channel extender

3. If a transmission is good, this is what happens when a mobile orportable cellular subscriber passes from one cell into another and thenetwork has to switch coverage responsibility from one base station toanother.
a. handshake
b. seamless interface
c. cross-bar switch
d. analog-to-digital conversion
e. handoff

4.This technology allows programmers to use Java programminglanguage and related tools to develop programs for mobile wireless informationdevices such as cellular phones and personal digital assistants (PDAs).
a. Enterprise JavaBeans
b. Java 2 Platform, Micro Edition
c. telemetrics
d. Specialized Mobile Radio
e. Windows CE

5. This is a computing and telecommunications industry specificationthat describes how mobile phones, computers, and personal digital assistantscan connect with phones and computers by using a short-range wireless connection.
a. Bluetooth
b. Bellcore
c. Blackberry
d. Bluebird
e. BeOS

6. This term was invented by networking expert John Sidgmore to describethe tiny portable electronic devices that experts predict will become wildlypopular with young people and put new demands on network bandwidth capacity.
a. script kiddy
b. eye candy
c. silicon cockroach
d. pulsing zombie
e. honey pot

7. This third-generation, broadband, packet-based transmission of text,digitized voice, and video offers a consistent set of services to mobilecomputer and phone users no matter where they are located in the world.
a. Universal Mobile Telecommunications System
b. Global Positioning System
c. triplecast
d. Synchronized Multimedia Integration Language
e. Broadband Integrated Services Digital Network

8. This family of "smart" microprocessors from Transmeta is expectedto introduce a new era of low-powered mobile devices that can run all daywithout requiring a battery recharge.
a. Palm
b. Crusoe
c. Kerberos
d. Proliant
e. PowerBuilder

9. This is a term used to describe what can happen when someoneaccidently sits on a cellular telephone.
a. hertz
b. killer app
c. infonesia
d. jam sync
e. phantom dialing

10. This wireless transmission refers to energy whose wavelengths arelonger than those of visible light, but shorter than those of radio waves.
a. infrared transmission
b. microwave
c. wavelength-division multiplexing
d. Terrestrial Trunked Radio
e. CD-Magneto Optical
#334
Chat Box / Re: Quiz:"WIRELESS & MOBILE"
Nov 10, 2008, 08:39 PM
Quiz: Mobile CRM vendors

1. True or False? Some experts predict that by 2010, mobile CRM will exceed the growth rates of traditional CRM.

a) True
b) False

2. True or false? One of the biggest obstacles in a sales force automation project is end user adoption.

a) True
b) False

3. True or False? According to some analysts, a combination of low market demand and complex technical issues has slowed entry of the big CRM software vendors into the mobile market.

a) True
b) False

4. Which vendor acquired Salesnet Inc. in May 2006 to beef up its SFA offering?

a) Oracle
b) Sage
c) RightNow
d) Microsoft

5. Which CRM vendor is offering mobile applications specifically designed for PalmOne, BlackBerry, and other handheld devices?

a) Oracle
b) SAP
c) Microsoft
d) Nearly all vendors

6. True or False? In 2005, analyst firm Forrester Research ranked Microsoft the best SFA for midmarket CRM.

a) True
b) False

7. According to analysts, not all CRM applications are ripe for mobilization. Which of the following besides SFA is a key focus area for mobile CRM?

a) Enterprise asset management
b) Field service automation
c) Both A and B
d) None of the above

8. Which of the following technical problems are mobile CRM vendors still struggling to address?

a) Making the CRM application accessible over non-broadband, wireless networks
b) Addressing security issues such as providing VPN clients, virus protection
c) Determining methods for securing the device if it's lost
d) All of the above

9. Which large CRM vendor announced a product called Sales OnDemand -- comprised mainly of SFA features including lead and pipeline performance management -- at its 2006 user conference?

a) Siebel
b) Oracle
c) SAP
d) None of the above

10. True or False? Salesforce.com is widely recognized for having experienced no service outages in 2005-2006.

a) True
b) False
#335
Chat Box / Quiz:"WIRELESS & MOBILE"
Nov 10, 2008, 08:37 PM
Quiz: Educating end users

QUESTION 1
You receive an unsolicited text message on your mobile phone saying "Thank you for joining Tel-a-Joke. Your account will be charged $1 a day for this service. You may cancel your membership at any time by visiting telejoke.com" What do you do?

    * a. Cancel the account. You never signed up.
    * b. Ignore the message. You never signed up.
    * c. Forward the message to your friends. They love jokes.


QUESTION 2
You and your co-worker just came back from the latest trade show. Your co-worker took a dozen photos of ergonomic office chairs using his cell phone's camera. You took photos of workstations the same way. How do you share the photos?

    * a. Swap memory cards.
    * b. Move photos to a flash drive and view them on a computer.
    * c. Trade phones.
    * d. Choice A or B.
    * e. Choice B or C.


QUESTION 3
You're sitting in a plane waiting for take off. Suddenly, you realize that you haven't seen your laptop since you sent it through the security x-ray machine. What do you do?

    * a. Ask the stewardess if you have enough time to go back to look for it.
    * b. Call airport security on your cell phone and ask them to send your laptop on the next plane.
    * c. Panic and start planning how you're going to explain it to your boss.
    * d. All of the above.


QUESTION 4
You've decided to buy a smartphone. Which mobile device platform carries the least risk for viruses or other malware attacks?

    * a. Symbian
    * b. Blackberry
    * c. Microsoft


QUESTION 5
True or false: Some mobile malware can call a device, make the device answer silently without the user's knowledge, and turn the device into a remote bug.

    * a. True
    * b. False


QUESTION 6
True or false: By default, most Bluetooth devices operate in an unprotected "non-secure" mode.

    * a. True
    * b. False


QUESTION 7
True or false: A mobile device can be programmed to scream like a woman if it's stolen.

    * a. True
    * b. False


QUESTION 8
Why are some network administrators so afraid of portable USB storage devices like flash drives that they resort to putting Crazy Glue in company computer USB ports?

    * a. Administrators can't manage USB devices through Group Policy.
    * b. The devices can accidentally spread malicious software through the network.
    * c. The devices can be used to quickly and surreptitiously steal sensitive data.
    * d. All of the above


QUESTION 9
You're at a convention in Las Vegas. Sometime after lunch you realize that you must have forgotten your company smartphone in the taxi you took to the convention hall. In your mind, you can picture it sitting right on top of the folder next to you in the cab. The folder's missing in action too. What do you do?

    * a. Try to remember the name of the cab company and call them.
    * b. Call your network administrator back in Boston.
    * c. Buy another smartphone.


QUESTION 10
How many unclaimed laptops did Heathrow Airport auction off in 2006?

    * a. 30
    * b. 730
    * c. 1,730
    * d. 3,307
#336
Chat Box / Re: QUIZ:"SAP"
Nov 10, 2008, 08:18 PM
Answers to quiz: SAP Time Management/CATS -- Beginner level

Correct answers:

Question #1: B
Question #2: E
Question #3: A
Question #4: A,B & C
Question #5: A & B
Question #6: A
Question #7: A
Question #8: A & B
Question #9: A
Question #10: A
Question #11: A
Question #12: A
Question #13: A, B &C
Question #14: A
Question #15: A, B, C &D
#337
Chat Box / Re: QUIZ:"SAP"
Nov 10, 2008, 08:18 PM
Answers to a quiz: Best practices in SAP security

Correct answers:

Question #1: B

Question #2: A

Question #3: B

Question #4: B

Question #5: A

Question #6: B

Question #7: A

Question #8: B

Question #9: C

Question #10: A

Question #11: B

Question #12: C

Question #13: B

Question #14: A

Question #15: A
#338
Chat Box / Re: QUIZ:"SAP"
Nov 10, 2008, 08:11 PM
Answers to quiz: SAP Master Data Management

Correct answers:

Question #1: A

Question #2: A

Question #3: B

Question #4: D

Question #5: A

Question #6: E

Question #7: C

Question #8: A

Question #9: B

Question #10: B

Question #11: B

Question #12: B

Question #13: C

Question #14: A

Question #15: B
#339
Chat Box / Re: QUIZ:"SAP"
Nov 10, 2008, 08:09 PM
Answers to quiz: SAP HR Personnel Administration

Correct answers:

Question #1: A

Question #2: A, B

Question #3: A, B, C, D

Question #4: D

Question #5: C, D, E

Question #6: A

Question #7: B, C

Question #8: B

Question #9: A, C, D

Question #10: C

Question #11: B, E

Question #12: A, B, D, E

Question #13: B, C, D

Question #14: A, C, D, E

Question #15: B, D, E

Question #16: A, B, D
#340
Chat Box / Re: QUIZ:"SAP"
Nov 10, 2008, 07:59 PM
SAP BI/BW quiz answers: advanced level

Correct answers:

Question #1: A, C, D

Question #2: A

Question #3: B, D

Question #4: B

Question #5: B

Question #6: B, C

Question #7: A, C, D

Question #8: A, B

Question #9: B

Question #10: A, C

Question #11: A, C

Question #12: A, D, E

Question #13: A, B, D

Question #14: A

Question #15: E
#341
Chat Box / Re: QUIZ:"SAP"
Nov 10, 2008, 07:57 PM
Quiz: SAP BI/BW -- intermediate level

Correct answers:

Question #1: A, B

Question #2: A, B

Question #3: D

Question #4: B

Question #5: A, C

Question #6: A, C

Question #7: A

Question #8: B

Question #9: C

Question #10: A, C

Question #11: A

Question #12: A, B, C

Question #13: A

Question #14: A

Question #15: A, B
#342
Chat Box / Re: QUIZ:"SAP"
Nov 10, 2008, 07:54 PM
SAP BI/BW quiz answers: beginner level

Correct answers:

Question #1: A, C, D

Question #2: A

Question #3: D

Question #4: A

Question #5: A, B, D

Question #6: A, C

Question #7: A, C

Question #8: C

Question #9: A, B, C

Question #10: A

Question #11: A

Question #12: A, B, C, D

Question #13: A, B, C, D

Question #14: A, B

Question #15: A, C
#343
Chat Box / Re: QUIZ:"SAP"
Nov 10, 2008, 07:52 PM
SAP Basis troubleshooting quiz answers

Correct answers:

Question #1: B

Question #2: B

Question #3: A

Question #4: B

Question #5: C

Question #6: B

Question #7: B

Question #8: C

Question #9: B

Question #10: C

Question #11: A, B

Question #12: B

Question #13: B

Question #14: A

Question #15: B
#344
Chat Box / Re: QUIZ:"SAP"
Nov 10, 2008, 07:50 PM
quiz: Get to know BP master data for CRM

Correct answers:

Question #1: D

Question #2: D

Question #3: E

Question #4: B

Question #5: C

Question #6: D

Question #7: D

Question #8: D

Question #9: C

Question #10: A

Question #11: C

Question #12: C

Question #13: D

Question #14: E

Question #15: C
#345
Chat Box / Re: QUIZ:"SAP"
Nov 10, 2008, 07:48 PM
quiz: ESA, XI and the new era of integration

Correct answers:

Question #1: B, C

Question #2: C

Question #3: A, B, C

Question #4: D

Question #5: D

Question #6: B, C, D

Question #7: A, B, C

Question #8: B

Question #9: B, D

Question #10: A, B, C, D

Question #11: B

Question #12: A, B, C

Question #13: B

Question #14: A, B, C

Question #15: B
#346
Chat Box / Re: QUIZ:"SAP"
Nov 10, 2008, 07:44 PM
Quiz: Duet 101

Correct answers:

Question #1: A
Question #2: A
Question #3: D
Question #4: C
Question #5: B
Question #6: B
Question #7: B
Question #8: B
Question #9: D
Question #10: A
#347
Chat Box / Re: QUIZ:"SAP"
Nov 10, 2008, 07:39 PM
Quiz: BW reporting

Correct answers:

Question #1: A, C

Question #2: D

Question #3: A

Question #4: C

Question #5: E

Question #6: C

Question #7: B

Question #8: A, B, C

Question #9: A

Question #10: B

Question #11: B

Question #12: A, D

Question #13: E

Question #14: B

Question #15: C
#348
Chat Box / Re: QUIZ:"SAP"
Nov 10, 2008, 07:35 PM
Quiz: Back to basics with mySAP SRM

ANSWER KEY:

Question #1: B
Question #2: D
Question #3: A, B
Question #4: A
Question #5: C
Question #6: A
Question #7: B, C, D
Question #8: A, D
Question #9: B, C, D
Question #10: A, D
Question #11: C
Question #12: A, B, C
Question #13: A, B, E
Question #14: A, C
Question #15: A, C
#349
Chat Box / Re: HEALTH CARE
Nov 10, 2008, 07:21 PM
The 7 Dangerous Act after meal

DON'T ACT THE 7 ACTIONS BELOW
AFTER YOU HAVE A MEAL   



Don't eat fruits immediately

Immediately eating fruits after meals will cause stomach to be bloated with air. Therefore take fruit 1-2 hr after meal or 1hr before  meal.



Don't drink tea

Because tea leaves contain a high content of acid. This substance will cause the Protein content in the food we consume to be hardened thus difficult to digest.



Don't smoke

Experiment from experts proves that smoking a cigarette after meal is comparable to smoking 10 cigarettes (chances of   cancer is higher).



Don't loosen your belt

Loosening the belt after a meal will easily cause the intestine to be twisted & blocked.


Don't bathe


  Bathing after meal will cause the increase of blood flow to the hands, legs & body thus the amount of blood around the stomach will therefore decrease.  This will weaken the digestive system in our stomach.



Don't walk about

  People always say that after a meal walk a hundred steps and you will live till 99. In actual fact this is not true. Walking will cause the digestive system to be unable to absorb the nutrition from the food we intake.
                 


Don't sleep immediately

The food we intake will not be able to digest properly. Thus will lead to gastric & infection in our intestine.



LET 'S MAKE ALL AWARE OF IT!!!

TAKE CARE.
#350
Chat Box / Re: QUIZ:"SAP"
Nov 10, 2008, 12:04 PM
Quiz: SAP XI for beginners

More people are realizing that SAP XI is an expanding module plagued by a significant shortage of consultants.

Interested in starting your SAP career by becoming an SAP XI consultant? Start by taking this quiz that will test you on SAP XI basics and see if you have what it takes to become an SAP XI consultant


QUESTION 1
Which is not a component of XI?

    * a) Integration directory
    * b) Integration builder
    * c) Central monitoring
    * d) Mobile procurement
    * e) System landscape directory


QUESTION 2
SAP XI usually reads messages in which language?

    * a) XML
    * b) ABAP
    * c) Java
    * d) BPEL4WS


QUESTION 3
Which is not associated with data stored in the in the integration repository?

    * a) Industry-standard messages
    * b) SAP messages
    * c) IP addresses
    * d) Business process templates


QUESTION 4
Which component defines the structure of a message for the integration server?

    * a) Integration directory
    * b) Integration builder
    * c) Central monitoring
    * d) Integration broker


QUESTION 5
SAP XI is compatible with software products of other companies (non-SAP applications)

    * a) True
    * b) False


QUESTION 6
Which component assesses whether messages are successfully flowing between systems?

    * a) Security
    * b) Central monitoring
    * c) Business process engine
    * d) System landscape directory


QUESTION 7
Which part of the integration builder "creates rules"?

    * a) Scenario editor
    * b) Process editor
    * c) Mapping editor
    * d) Condition editor
    * e) Interface editor


QUESTION 8
The integration builder has the ability to generate a "proxy"; what is a "proxy"?

    * a) A complete blueprint of your business
    * b) A storage for the most technical parts of the infrastructure
    * c) A directory of technical information about the programs and computers being connected by SAP XI
    * d) A program that has a fill-in-the-blanks sort of structure that can be enhanced to do what you need


QUESTION 9
BPEL4WS is the language used by the graphical tool in the model development process

    * a) True
    * b) False


QUESTION 10
What component houses the receiver determination, interface determination and channel determination?

    * a) Integration server
    * b) Integration directory
    * c) Integration repository
    * d) Integration builder
#351
Chat Box / Re: QUIZ:"SAP"
Nov 10, 2008, 12:01 PM
SAP Time Management/CATS -- Beginner level

1. Which of the following options can be used instead of creating a separate work schedule rule for each part-time employee?

a) Part-time indicator
b) Dynamic daily work schedule
c) Counting class for the period work schedule
d) All of the above

2. Whether you record hours or clock times for an employee depends on:

a) Employee's time management status in the Planned Working Time infotype
b) Work schedule rule assigned to the employee in the Planned Working Time infotype
c) Employee's assigned personnel area, sub-area, and so on in the Organizational Assignment infotype
d) Only a & b
e) All of the above

3. True or false? You can run time evaluation for an employee without sending the evaluated time data to payroll.

a) True
b) False

4. If you enter absences using clock times, you have the following options:

a) You enter the end time and the absence hours. SAP R/3 automatically calculates the start time
b) You enter the start time and the absence hours. SAP R/3 automatically calculates the end time
c) You enter the start and end time. SAP R/3 automatically calculates the employee's absence hours

5. The previous day indicator in SAP Time Management is...

a) Used to indicate that the record must be assigned to the previous day
b) Relevant for daily work schedules that include two calendar days, for example, from 10:00 p.m. until 6:00 a.m.
c) Indicative that the previous day was a working day as per the work schedule rule

6. In a cost assignment scenario where an employee is required to perform a task involving costs that are not assigned to his or her master cost center, you can achieve this by...

a) Assigning Substitutions infotype (IT2003)
b) Overwriting the cost center in IT0001
c) Changing the tasks in the employee's assigned jobs

7. True or false? The deduction period for an absence quota need not be the same as the validity period for the absence quota:

a) True
b) False

8. The following statements are true for automatically accrued absence quotas:

a) You cannot change automatically accrued absence quotas manually in the Absence Quotas infotype (IT2006)
b) You can use the Quota Corrections infotype (IT2013) to change the automatically accrued absence quotas
c) You can use the Time Quota Compensation infotype (0416) to change the automatically accrued absence quotas

9. Where do you define to transfer time data directly to HR master data without running the time transfer program?

a) Define in the general setting of the data entry profile
b) Define in the Attendance/Absence types
c) Define in the time evaluation program

10. True or false? You can default the cost center value on the employee's timesheet.

a) True
b) False

11. True or false? You can use the Employee Remuneration infotype (2010) to enter wage types manually and specify information directly for payroll.

a) True
b) False

12. If there are exceptions to the normal daily work schedule on public holidays or on days which follow a public holiday, this can be handled with:

a) Daily work schedule selection rule
b) Period work schedule selection rule
c) Public holiday class

13. Which of the features below are used to default a value in the Planned Working Time infotype (IT00007)?

a) TMSTA
b) SCHKZ
c) WWEEK
d) QUOMO
e) All of the above

14. True or false? The general field selection settings (modifiable) have priority over the settings you make under influencing.

a) True
b) False

15. From which of the following modules can time sheet records be transferred from the CATS database?

a) Human Resources (HR)
b) Controlling (CO)
c) Project System (PS)
d) Plant Maintenance/Customer Service (PM/CS)
e) Supply Chain Management (SCM)
#352
Chat Box / Re: QUIZ:"SAP"
Nov 10, 2008, 11:59 AM
Quiz: SAP security best practices

1. Say you have a transaction code that must be locked down so no one can use it. How can you lock and unlock this transaction?

a) Use R3trans and tp utilities with tp unlck and tp lock at the operating system.
b) Use transaction sm01 to find the transaction and lock/unlock it.
c) Run report rslocktrans from se38 and enter the variant value for the desired transaction and the lock/unlock checkbox.
d) Always use the ABAP workbench to lock transactions.

2. How do you set up and use system auditing of transactions?

a) Enter the filter criteria in sm19 and activate the trace. Read results with sm20.
b) Use SQLplus to query the history table and select data based on user ID.
c) Use pa20 to get the personnel number of an employee and then search usr01 for transactional history.
d) You must install the ST-PI add on software to allow transactional auditing.

3. In newer versions of SAP, Central User Administration (CUA) is active by default for distribution of user IDs and roles amongst remote systems.

a) True
b) False

4. How can you broadcast a message to all users of the SAP system?

a) SAPmail has functions to display system messages to broadcast all users.
b) Transaction sm02 will provide text boxes to submit a system-wide message.
c) This must be set up as a profile parameter (login/messagecreate=true). Once the value is set, users can send it with the options under menu path system->status.
d) Only users with SAP_ALL authorizations can broadcast from transaction sm03.

5. What SAP default user is installed with SAP and how can you disable this user to prevent security holes?

a) SAP* -- Set the profile parameter login/no_automatic_user_sapstar to a value greater than zero.
b) SAP* and DDIC -- Use transaction su01 to delete the user IDs.
c) SAP* This user can't be disabled as it is the backdoor for SAP to log in to your system.
d) Use SQLplus to delete the user IDs DDIC and SAP*.

6. What are the SAP default usernames and passwords?

a) DDIC=SAP4ALL, SAP*=PASS
b) DDIC= 19920706, SAP*=PASS
c) DDIC= change at login ,SAP*== change at login

7. What fundamental authorization object is to be used as the first line of defense in checking authorization for a transaction code?

a) S_tcode
b) Auth_init_check
c) Init_tcode_check
d) A_tcode

8. When a user is denied authorization when trying to access SAP information, what transaction will provide the name of the authorization object that caused denial to the transaction?

a) Transaction suim. Reports run from this transaction and it displays the objects along with the transaction under the user's dropdown.
b) Transaction su53. Run transaction su53 as the unauthorized user immediately after the authorization failure is displayed.
c) Transaction se38. Run report rsdispusrauth to show the authorizations needed for each transaction. Then add those to the user ID's role.
d) Transaction pfgg. If you're using CUA, you must log in to the system where the failure occurred and check transaction pfcg against the user ID for the authorization object shown in the associated short dump.

9. Once you have verified that a role is missing an authorization, how can you check the role to validate and update the current actions that are allowed?

a) Use the role mapper utilities to see if a user is part of the correct group.
b) In transaction su01, add sap_new profile to the user ID and have them log out and log back in.
c) Use transaction PFCG to check the role to be added or altered for that user ID and turn on technical names to view detailed data on the authorization object.
d) You must create a new role for that user so they can access the desired data.

10. What tables make up the majority of the user master records? (Hint: If I wanted to find user master data, what table names can I search in se16 to validate user data on specific keys?)

a) Us*
b) Psapuser
c) User master records are keyed from several different tables so unlike other SAP master records, user master is unique.
d) Sapr3.userdata

11. What does the term "technical names on" refer to?

a) This is the list of names of Basis users -- it can be displayed if you get the prompt: "Contact your system administrator".
b) This is a profile-generator menu option that puts the technical name of the authorization object next to the long text, so the required authorization name can easily be identified.
c) This is a parameter that needs to be set to on for Early Watch Reports and Alerts.
d) This is a reference that was used for viewing ABAP security codes in older versions of SAP (prior to version 4.6x).

12. When displaying SAP content using a Web browser, what is an effective way to ensure that data is protected from hackers?

a) Use Secure Sockets Layer (SSL)
b) Use an intermediate server to act as a proxy for your Web content.
c) A and B.
d) None of the above.

13. What table names contain profile change history?

a) usr10, usr12
b) ush10, ush12
c) sapr3.usr01, sapr3.usr10

14. What is the best way to list all profile parameters that pertain to login sensitive rules and policies (ie. Login/password_expiration_time)?

a) Run report rsparam from sa38 and select the checkbox for the unsubstitued values. Then search report for keyword "login." This will display the login parameters for the system.
b) Use transaction rz10 to display all parameters.
c) From the operating system, view all parameters from the profile directory.

15. If you forget your password and can't get into your system, what back door can you use to reset it?

a) Delete SAP* from DB using SQLplus and then login as SAP* again with password=pass if SAP* is allowed.
b) You will need to open a message with OSS and they can provide you with a user name and password that can be used once to gain access.
c) You can login to a different client number and change the password from there
#353
Chat Box / Re: QUIZ:"SAP"
Nov 10, 2008, 11:55 AM
Quiz: SAP Master Data Management

1. Which statement is true regarding SAP MDM Content Consolidation?

a. The scenario SAP MDM Content Consolidation describes the process of consolidating master data from different systems.
b. The scenario SAP MDM Content Consolidation describes the process of consolidating master data from one system.
c. There is no such a thing as SAP MDM Content Consolidation.

2. In the business scenario SAP MDM Content Consolidation, the process initial load from trusted client is not available.

a. True
b. False

3. Why does any data cleansing activities take place at a later date on the MDS (Master Data Server)?

a. Data cleansing takes place at the same time
b. To improve system performance during the load
c. There is no cleansing data available

4. What tools are available to integrate SAP MDM and other non-SAP applications and platforms?

a. Java
b. .Net
c. API
d. All of the above

5. Is the Product Catalog Management application part of the SAP NetWeaver Integration and Application Platform? Does print publishing belong to this platform as well?

a. Yes
b. No

6. Which statement is true?

a. MDM can send changed records through API
b. MDM can send changed records through Syndicator
c. MDM can send changed fields through API and Syndicator
d. None of the above
e. a and b

7. What options are available for resending from MDM within XI or R/3 in case an update fails?

a. no resending possible
b. the same XML can be fixed and resent
c. the same XML can be processed

8. Is it possible to develop Web forms (outside of EP6) that link to standard Java MDM APIs and communicate with the MDM repository?

a. Yes
b. No

9. Is it possible to assign the saved search criteria to a role or person to restrict what he or she can view in the search?

a. Yes
b. No

10. Are adapters/extensions available in MDM for integrating monitoring tools? (i.e., does Tivoli register if an exception occurs in MDM?)

a. Yes
b. No

11. Can two servers run on the same computer?

a. Yes
b. No
c. Maybe

12. What is NULL and how is it used in MDM?

a. Blank
b. Data marker
c. Empty

13. What does "Required" stand for?

a. Mandatory
b. Not mandatory
c. Advisory

14. Can LDAP property "MDMERoles" be changed to something else?

a. Yes
b. No

15. Can an attribute have additional parameters associated with it like status or userID timestamp?

a. Yes
b. No
c. Only type, name, alias and description
#354
Chat Box / Re: QUIZ:"SAP"
Nov 10, 2008, 11:54 AM
Quiz: SAP HR Personnel Administration

1. There are three structures in HR, which are Enterprise Structure, Personnel Structure and Organizational Structure.

a. True
b. False

2. The following consideration(s) should be taken into account when defining the Enterprise Structure:

a. Clients are defined at the highest level of the Enterprise Structure.
b. Company codes are defined in Financial Accounting and must be country specific and can be used to help generate default values in employee master records.
c. Personnel Areas are defined in Human Resources and are assigned to one or more Company codes and can be used in defining authorizations.
d. Personnel Subareas are defined in Human Resources and are assigned to one Personnel Area only and can be used in defining authorizations.

3. What elements make up the Enterprise Structure?

a. Client
b. Company code
c. Personnel Area
d. Personnel Subarea
e. Employee Subgroup

4. The following consideration(s) should be taken into account when defining the Personnel Structure:

a. The highest level of the Personnel Structure is the Employee Group which is country specific and can be used to default values for employee master data records.
b. Employee groups are linked to the Enterprise Structure by being assigned to the Company code.
c. An Employee Subgroup can be assigned to one or more Employee Groups and used in defining authorizations.
d. Employee Subgroup can be used to define how an employee's payroll is processed.

5. Organizational Structure includes which of the following areas?

a. Payroll area
b. Company code
c. Organizational units
d. Positions
e. Jobs

6. The following is true about Payroll Accounting:

a. Payroll Accounting is country specific.
b. Payroll Accounting is NOT country specific.
c. Payroll Accounting does not need time evaluation.
d. Only one payroll area can be run at a time.
e. All Infotypes can be maintained while running the payroll.

7. The Payroll Accounting area includes which functions?

a. The Payroll Accounting area ensures that all employees who are paid with the same frequency, e.g., weekly, area accounted in the same payroll run.
b. The Payroll Accounting area defines the exact dates of the payroll period.
c. The Payroll Accounting area can be used as a selection criteria for Time Evaluation.
d.The Payroll Accounting area can be used for authorization check.

8. The Organizational Key is used for which of the following?

a. To provide a link to Organizational Unit in the Personnel Planning and Development Component (PD) when integration is active.
b. To define additional authorization checks.
c. To group administrators together in on Org Key.
d. To provide a link to the Cost Center when the integration with PD is not active.

9. Personnel Area has which of the following functions?

a. A factor in generating default values
b. Personnel Area executes the payroll driver.
c. Personnel Area can be used for selection criteria for reporting.
d. Personnel Area can be used for authorization checks.
e. Personnel Area can determine if the employee is clocked in or out.

10. In which Infotype are an employee's Enterprise and Personnel Structure assignment stored?

a. Basic Pay (IT0008)
b. Address (IT0006)
c. Organizational Assignment (IT0001)
d. Bank Details (IT0009)
e. None of the above

11. The Organizational Assignment Infotype (IT0001) is used for which of the following purposes?

a. The Organizational Assignment Infotype assigns an employee to either the Enterprise Structure or the Personnel Structure.
b. IT0001 is used to allocate to the a particular frequency, e.g., bi-weekly
c. IT0001 is used to provide the link to the Personnel Planning and Development Component (PD), if integration is active, through the Job Key
d. IT0001 is used to allow one ore more cost centers to be assigned to the employee
e. IT001 is used to assign Personnel Administrator, Time Administrator and Payroll Administrator -- if required -- to the employee.

12. The Personnel Control Record has which of the following functions?

a. The Personnel Control Record determines the dates of the current payroll period.
b. The Personnel Control Record defines retroactive accounting periods.
c. The Personnel Control Record locks all master data and time data records during the payroll cycle.
d. The Personnel Control Record defines the earliest retroactive accounting period for the payroll area.
e. The Personnel Control Record controls the current status within the payroll cycle.

13. Which of the following statements about integration between PA & PD are valid?

a. Integration between PA and PD is set by filling the field PLOGI ORGA with an X, not other setting is required.
b. By specifying the Position with integration between PA and PD is active, the associated Organizational Units and Jobs are automatically assigned to the Organizational Assignment Infotype (IT0001).
c. Employee Groups and Employee Subgroup can be defaulted into the Organizational Assignment Infotype (IT0001) when integration between PA and PD is active.
d. Personnel areas and Personnel Subareas can be defaulted into the Organizational Assignment Infotype.
(IT0001) when integration between PA and PD is active.

14. Which of the following apply to Personnel Subareas?

a. Personnel Subareas defines the country grouping.
b. Personnel Subareas defines the currency and language.
c. Personnel Subareas defines groupings for work schedules, absences and leave types.
d. Personnel Subareas defines the public holiday calendar.
e. Personnel Subareas defines personnel subarea-specific wage types for each personnel area.

15. Which of the following applies to a feature in SAP HR?

a. It is used to valuate wage types.
b. It controls system processes.
c. It controls batch processing.
d. It defaults values based on certain criteria.
e. It can be accessed by transaction code PE03.

16. Which of the following are groupings for Employee Subgroups?

a. Primary Wage Types
b. Personnel Calculation Rule
c. Administrators
d. Collective Agreement Provision (CAP)
e. Model Wage Types
#355
Chat Box / Re: QUIZ:"SAP"
Nov 10, 2008, 11:50 AM
SAP BW certification quiz

QUESTION 1
Which of the following describes a Result Set query?

    * a. A prequery
    * b. A query using flat tables (ODS object or InfoObject)
    * c. A nested query where the results of a first query are used as entry values for a second query
    * d. There is no such thing in SAP BW
    * e. None of the above


QUESTION 2
Which of the following is correct about Profile Generator?

    * a. It is a tool to automatically generate Authorization Profile
    * b. It is a tool existing in OLTP systems only
    * c. Complete the Administrator work with extra tasks to set up authorization
    * d. A tool that can be used by end users to modify their authorizations
    * e. None of the above


QUESTION 3
What do the SAP BW content extractors provide?

    * a. Generic extractors
    * b. Custom extractors
    * c. There is no such thing in SAP BW content
    * d. Data sources that can be activated for all applications
    * e. None of the above


QUESTION 4
Using PSA as a loading process, which of the following methodologies can be used?

    * a. To PSA, then to the data target
    * b. To PSA only
    * c. To data target only
    * d. To PSA and data target in parallel
    * e. None of the above


QUESTION 5
Which of the following is a supply of workbooks in SAP BW arranged according to ttopic areas?

    * a. An InfoSource
    * b. A channel
    * c. An InfoArea
    * d. An InfoCatalog
    * e. An InfoObject


QUESTION 6
What is the maximum number of key figures in an InfoCube?

    * a. 13
    * b. 85
    * c. 322
    * d. 233


QUESTION 7
Which of the following tools helps in the Web reporting area?

    * a. The Web agent
    * b. The front-page tool
    * c.The Web wizard
    * d. The query view


QUESTION 8
When are aggregates useful?

    * a. Always
    * b. They are useful only for key figures with aggregation SUM, MIN, or MAX
    * c. For reorganizations and realighnments
    * d. To increase the speed of loading during data update
    * e. None of the above


QUESTION 9
Which of the following is correct about SAP BW Statistics?

    * a. Data volume of the SAP BW Statistics cannot be anticipated
    * b. SAP BW Statistics are delivered as a part of the technical content
    * c. All SAP BW Statistics query objects start with OSAP
    * d. All SAP BW Statistics InfoObject catalogues start with OSAP
    * e. SAP BW Statistics is automatically activated


QUESTION 10
In FI/SL we can create a ledger based on what type of tables?

    * a. Aggregate tables
    * b. InfoCube level tables
    * c. Line-item level tables
    * d.Summarization level tables
    * e. Total tables


#356
Chat Box / Re: QUIZ:"SAP"
Nov 10, 2008, 11:46 AM
Quiz: SAP BI/BW -- advanced level

Good luck!

1. Select the correct statements about the steps executed by a change run.

a. The steps activate the new master data and hierarchy data changes.
b. All aggregates are realigned and recalculated.
c. Aggregates containing navigational attributes are realigned and recalculated for the master data changes.
d. The steps delete the 'A' (active) records for which the 'M' (modified) records exist from master data tables, and makes all modified records active.
e. All of the above.

2. Key figures that are set for exception aggregation MIN or MAX in an aggregate cause the aggregates to be completely rebuilt for each change run alignment.

a. True
b. False

3. If special characters are not defined in transaction RSKC in BW then:

a. These characters cannot be loaded into BW at all.
b. These characters can only be loaded into text fields.
c. These characters can be loaded into attributes and texts.
d. BW won't be able to generate the SIDs for these characters because all the fields where SIDs are generated cannot be loaded.
e. None of the above.

4. A change run updates the 'E' table of the aggregates while doing the alignment for changes in the master data.

a. True
b. False

5. Select the correct statements related to the control parameters for a data transfer in table ROIDOCPRMS in the BW source system.

a. The field MAXSIZE is the maximum number of records which can be transferred to BW in a single packet.
b. The field MAXSIZE is the size in KB which is used to calculate the number of records per data packet.
c. MAXLINES is the maximum number of records which can be transferred to BW per data load.
d. If the number of data records per packet exceeds MAXLINES value the extraction process fails.

6. Identify the differences between an Infoset and a Multiprovider.

a. Both Multiproviders and Infosets can contain all the info providers in BW.
b. Queries built on Multiproviders use 'union' and queries on Infosets use 'join' to retrieve data from different info providers.
c. Both Multiproviders and Infosets do not have data, but data is accessed from the basic info providers used in these objects.
d. None of the above.

7. Select the correct statements about the OLAP Cache Monitor in BW.

a. The transaction for the OLAP Cache Monitor is RSRCACHE.
b. If the persistent mode is inactive then the cache is inactive and query results will not be cached in memory.
c. A 'read flag' is set in the Cache Monitor when data is read from the cache.
d. When new data is loaded into the info provider which the query is built on, the cache for that query is invalidated.
e. All of the above.

8. Select the correct statements about ODS settings.

a. Performance of the ODS activation improves when the BEx reporting flag is switched to off.
b. Overwriting a data record is not allowed if the 'unique' data record flag is set.
c. Data targets are updated from the ODS regardless of the ODS activation status.
d. All of the above.

9. It is not possible to activate an ODS which contains a request from a full load and a Delta Initialization load of the same data source.

a. True
b. False

10. Select the correct statements regarding data deletion settings in an InfoPackage.

a. It is possible to set an InfoPackage to delete all the data in an InfoCube during the loads.
b. Only uncompressed data can be set to be deleted from the cube in an InfoPackage during the loads.
c. Deletion settings can be done only for basic InfoCubes.
d. Data deletion settings in an InfoPackage are possible only for full loads.
e. All of the above.

11. Select the correct statements about parallel processing in Multiproviders.

a. Multiprovider queries create one process per info provider involved and are processed parallel by default.
b. It is not possible to make Multiprovider queries run sequential.
c. Multiprovider queries create a parent process which provides a synchronization point to collect the overall result from other sub processes.
d. Parallel processing is always faster than sequential processing in Multiproviders.
e. All of the above.

12. Select the correct statements about the ALPHA conversion routine in BW.

a. An ALPHA conversion routine is assigned to a characteristic info object automatically when it is created.
b. An ALPHA conversion routine is used to convert characteristic values from 'external to internal' values only.
c. Conversion is done on alphabets and numeric input values.
d. An ALPHA conversion routine removes the spaces on the right side of numeric values and right aligns them.
e. The left side of the numeric input values are filled with zeros.

13. Select the correct statements related to navigational attributes.

a. It is better to avoid using navigational attributes from a query performance point of view.
b.If a navigational attribute is used in an aggregate, the aggregate needs to be adjusted every time there is a change in the values of this attribute.
c. An attribute included as a characteristic in the InfoCube has the same effect as being used as a navigational attribute in the cube.
d. A navigational attribute can be made to display an attribute without removing data from the InfoCube.
e. None of the above.

14. A 'Check for Referential Integrity' can only be possible for information sources with flexible updating.

a. True
b. False

15. Select the correct statements about physical partitioning in BW.

a. New partitions on F table of an InfoCube are created during data loads to the InfoCube.
b. An E fact table is created when activating an InfoCube with a number of partitions corresponding to the partition value range.
c. If a cube is not partitioned before populating with data, it is not possible to partition the cube without removing all the data.
d. PSA table partitions can contain more than one request.
e. All of the above.
#357
Chat Box / Re: QUIZ:"SAP"
Nov 10, 2008, 11:45 AM
Quiz: SAP BI/BW -- intermediate level

1. Identify the statement(s) that is/are true. A change run...

a. Activates the new Master data and Hierarchy data
b. Aggregates are realigned and recalculated
c. Always reads data from the InfoCube to realign aggregates
d. Aggregates are not affected by change run

2. Which statement(s) is/are true about Multiproviders?

a. This is a virtual Infoprovider that does not store data
b. They can contain InfoCubes, ODSs, info objects and info sets
c. More than one info provider is required to build a Multiprovider
d It is similar to joining the data tables

3. The structure of the PSA table created for an info source will be...

a. Featuring the exact same structure as Transfer structure
b. Similar to the transfer rules
c. Similarly structured as the Communication structure
d. The same as Transfer structure, plus four more fields in the beginning

4. In BW, special characters are not permitted unless it has been defined using this transaction:

a. rrmx
b. rskc
c. rsa15
d. rrbs

5. Select the true statement(s) about info sources:

a. One info source can have more than one source system assigned to it
b. One info source can have more than one data source assigned to it provided the data sources are in different source systems
c. Communication structure is a part of an info source
d. None of the above

6. Select the statement(s) that is/are true about the data sources in a BW system:

a. If the hide field indicator is set in a data source, this field will not be transferred to BW even after replicating the data source
b. A field in a data source won't be usable unless the selection field indicator has been set in the data source
c. A field in an info package will not be visible for filtering unless the selection field has been checked in the data source
d. All of the above

7. Select the statement(s) which is/are true about the 'Control parameters for data transfer from the Source System':

a. The table used to store the control parameters is ROIDOCPRMS
b. Field max lines is the maximum number of records in a packet
c. Max Size is the maximum number of records that can be transferred to BW
d. All of the above

8. The indicator 'Do not condense requests into one request when activation takes place' during ODS activation applies to condensation of multiple requests into one request to store it in the active table of the ODS.

a. True
b. False

9. Select the statement(s) which is/are not true related to flat file uploads:

a. CSV and ASCII files can be uploaded
b. The table used to store the flat file load parameters is RSADMINC
c. The transaction for setting parameters for flat file upload is RSCUSTV7
d. None of the above

10. Which statement(s) is/are true related to Navigational attributes vs Dimensional attributes?

a. Dimensional attributes have a performance advantage over Navigational attributes for queries
b. Change history will be available if an attribute is defined as navigational
c. History of changes is available if an attribute is included as a characteristic in the cube
d. All of the above

11. When a Dimension is created as a line item dimension in a cube, Dimensions IDs will be same as that of SIDs.

a. True
b. False

12. Select the true statement(s) related to the start routine in the update rules:

a. All records in the data packet can be accessed
b. Variables declared in the global area is available for individual routines
c. Returncode greater than 0 will be abort the whole packet
d. None of the above

13. If a characteristic value has been entered in InfoCube-specific properties of an InfoCube, only these values can be loaded to the cube for that characteristic.

a. True
b. False

14. After any changes have been done to an info set it needs to be adjusted using transaction RSISET.

a. True
b. False

15. Select the true statement(s) about read modes in BW:

a. Read mode determines how the OLAP processor retrieves data during query execution and navigation
b. Three different types of read modes are available
c. Can be set only at individual query level
d. None of the above
#358
Chat Box / Re: QUIZ:"SAP"
Nov 10, 2008, 11:43 AM
Quiz: SAP BI/BW -- beginner level

1. The following transactions are relevant to the data sources in an SAP BW source system.

a. RSA3
b. RSA4
c. RSA5
d. RSA6

2. True or False? A reference characteristic will use the SID table and master data table of the referred characteristic.

a. True
b. False

3. The following statements are not true about navigational attributes.

a. An attribute of an info object cannot be made navigational if the attribute-only flag on the attribute info object has been checked.
b. Navigational attributes can be used to create aggregates.
c. It is possible to make a display attribute to navigational in an info cube data without deleting all the data from the info cube.
d. Once an attribute is made navigational in an info cube, it is possible to change it back to a display attribute if the data has been deleted from the info cube.

4. True or False? It is possible to create a key figure without assigning currency or unit.

a. True
b. False

5. The following statements are true for compounded info objects.

a. An info cube needs to contain all info objects of the compounded info object if it has been included in the info cube.
b. An info object cannot be included as a compounding object if it is defined as an attribute only.
c. An info object can be included as an attribute and a compounding object simultaneously.
d. The total length of a compounded info object cannot exceed 60.

6. The following statements are true for an info cube.

a. Each characteristic of info cube should be assigned to at least one dimension.
b. One characteristic can be assigned to more than one dimensions.
c. One dimension can have more than one characteristic.
d. More than one characteristic can be assigned to one line item dimension.

7. The following statements are true for info cubes and aggregates.

a. Requests cannot be deleted if info cubes are compressed.
b. A request cannot be deleted from an info cube if that request (is compressed) in the aggregates.
c. Deleting a request from the cube will delete the corresponding request from the aggregate, if the aggregate has not been compressed.
d. All of the above.

8. The following statements are true regarding the ODS request deletion.

a. It is not possible to delete a request from ODS after the request has been activated.
b. Deleting an (inactive) request will delete all requests that have been loaded into the ODS after this request was loaded.
c. Deleting an active request will delete the request from the change log table.
d. None of the above.

9. The following statements are true for aggregates.

a. An aggregate stores data of an info cube redundantly and persistently in a summarized form in the database.
b. An aggregate can be built on characteristics or navigational attributes from the info cube.
c. Aggregates enable queries to access data quickly for reporting.
d. None of the above.

10. True or False? If an info cube has active aggregates built on it, the new requests loaded will not be available for reporting until the rollup has been completed successfully.

a. True
b. False

11. What is the primary purpose of having multi-dimensional data models?

a. To deliver structured information that the business user can easily navigate by using any possible combination of business terms to show the KPIs.
b. To make it easier for developers to build applications, that will be helpful for the business users.
c. To make it easier to store data in the database and avoid redundancy.
d. All of the above.

12. The following statements are true for partitioning.

a. If a cube has been partitioned, the E table of the info cube will be partitioned on time.
b. The F table of the info cube is partitioned on request.
c. The PSA table is partitioned automatically with several requests on one partition.
d. It is not possible to partition the info cube after data has been loaded, unless all the data is deleted from the cube.

13. The following statements are true for OLAP CACHE.

a. Query navigation states and query results are stored in the application server memory.
b. If the same query has been executed by another user the result sets can be used if the global cache is active.
c. Reading query results from OLAP cache is faster than reading from the database.
d. Changing the query will invalidate the OLAP cache for that query.

14. The following statements are true about the communication structure.

a. It contains all the info objects that belong to an info source.
b. All the data is updated into the info cube with this structure.
c. It is dependent on the source system.
d. All of the above.

15. The following statements are untrue about ODSs.

a. It is possible to create ODSs without any data fields.
b. An ODS can have a maximum of 16 key fields.
c. Characteristics and key figures can be added as key fields in an ODS.
d. After creating and activating, an export data source is created automatically.
#359
Chat Box / Re: QUIZ:"SAP"
Nov 10, 2008, 11:40 AM
Quiz: SAP Basis troubleshooting

1. SAPGUI deployment
You have been asked to deploy SAPGUI to several departments within an organization that uses Windows XP on their desktops. Not all departments need the same components (BW add-on, CRM add-on, etc.). Additionally, you have been instructed to install "SAPGUI scripting" – but only in the IT department. What's the best course of action?

a) Write up a step-by-step instruction sheet for each department and have the IT staff help you deploy SAPGUI following your instructions.
b) Use "SAPAdmin" to package each different department installation and either deploy SAPGUI remotely, or install it over the network.
c) Copy the entire SAPGUI CD to a network share and install all front-end components on every computer.

2. Dispatcher
The CIO wants to improve the system response of each SAP server, so he is thinking of adding more dispatchers and work processes. He asks you, "How many dispatchers can exist per application server (instance)?".

a) 2
b) 1
c) 8
d) 16

3. Transports within the same system
Developers in your organization are complaining that some customizing transports did not make it to their sandbox client (300). The project manager asks you to give him a report of all transports copied from the development client (100) to the sandbox client (300) for the past two months. How can you get this done?

a) Query table CCCFLOW and produce a report for him.
b) Use transaction SCC3 -> Transport Requests and produce a report.
c) Find all your transport-related e-mails and filter for those asking to import into client 300. Then, produce a report for him.

4. LiveCache
A server hosting APO and LiveCache was rebooted and your bosses are asking you to make sure LiveCache gets started. You have a connection to the APO instance through SAProuter. What transaction code can you use to start and manage LiveCache?

a) LCACHE
b) LC10
c) LICA

5. Client 001 in R/3
After a fresh installation of an R/3 system, a consultant deleted client 001 without telling anybody. The development team, who was going to work on client 001, is suggesting that you restore the database prior to the deletion. Others are suggesting that you re-install the system. What should you do if there no database backup available and this needs to be done as soon as possible?

a) Re-install the database instance.
b) Have SAP do a system repair and lock it against client deletions.
c) Re-create client 001 via SCC4 and carry out a local copy using client 000 as the source.

6. Changes to the SAP standard
True or False: Users with developer registration keys can modify any SAP object they want in the system without having to register each object at the SAP Support Portal -> SSCR.

a) True
b) False

7. SQL Server collation for SAP Web AS 6.40
What collation is required in Microsoft SQL Server 2000 for products based on the SAP Web Application Server 6.40 to properly sort Unicode data?

a) SQL_Latin1_General_CP1_CS_AS
b) SQL_Latin1_General_CP850_BIN2
c) SQL_Latin1_General_CP850_BIN

8. Default TCP port for message server
The network administrators are making sure that only TCP and UDP ports are open in each server. They are asking you what port the message server service uses. What's the correct answer?

a) TCP 3200
b) TCP 3299
c) TCP 3600
d) UDP 1434

9. Kernel update
True or False: It is necessary to stop both the SAP instance and database server before a kernel update.

a) True
b) False

10. Transport Management System (TMS)
What parameter needs to be implemented in TMS to enable Extended Transport Control?

a) XTC = 1
b) ETC = TRUE
c) CTC = 1

11. SAPLogon entries in SAPGUI
You want to deploy SAPGUI along with a default list of SAPLogon sessions to 25 users in your organization. Which of the following scenarios would work?

a) Run a script that copies "saplogon.ini" to all 25 users' computers.
b) Create a directory called "custom" in your FrontEnd Installation Server, copy the "saplogon.ini" containing the default session entries in the directory and deploy SAPGUI via SAPAdmin.
c) Tell your Windows network administrator to create a group policy that downloads the "saplogon.ini" file into all computers within the organization.

12. Background jobs
True or False: Background jobs with status "scheduled" are those that have been set with a start condition (date, event, etc.). On the other hand, jobs with status "released" are those that have been created but do not have a start condition, yet.

a) True
b) False

13. Database monitoring
You're going on vacation and you need to train some of the IT staff on how to monitor database activity and performance. What transaction code would be very useful for them to know?

a) DB01
b) ST04
c) DB12
d) SBWP

14. SAProuter connections
What command should you run to get a list of all SAProuter active connections?

a) saprouter –l
b) saprouter –v
c) saprouter –c

15. Deleted RFC destinations
An RFC destination from your production server to an e-commerce server has stopped working all of a sudden. You later find out that the RFC destination no longer exists. Where would you look to find out who deleted it and when?

a) Nowhere, because RFC deletions are not recorded anywhere.
b) The system log (SM21).
c) File dev_rfc0 at the operating system level
#360
Chat Box / Re: QUIZ:"SAP"
Nov 10, 2008, 11:38 AM
Quiz: Get to know BP master data for CRM

1. How many BP classifications exist in mySAP CRM?

a) One
b) Two
c) Three
d) Five
e) None of the above

2) Identify the BP categories

a) Person
b) Organization
c) Group
d) All of the above
e) None of the above

3) The following describes BP roles:

a) The BP role is assigned to the business partner based on the business process.
b) Configuration of screens and fields can be done per BP role.
c) Authorization checks can be setup per BP role.
d) One Business partner can have one or more roles.
e) None of the above.

4) Can a BP with the classification "rented address" be distributed to the back-end R/3 system?

a) Yes
b) No
c) It depends
d) You never know
e) None of the above

5) How many international address versions are supported by SAP in WAS 6.20?

a) Seven
b) Nine
c) 11
d) 12
e) None of the above

6) How many address formats are offered in standard mySAP CRM?

a) US only
b) Europe/Standard only
c) Japan only
d) All of the above
e) None of the above

7) The following explains the address usage feature:

a) It is configurable and allows addresses for different usage.
b) The default address in a transaction can be maintained in a partner determination.
c) The system prompts for address selection if it is not specified in the partner determination, when multiple addresses are maintained in address usage.
d) All of the above
e) None of the above

8 Which one of the following describes the role of the BP-type field?

a) Used to group business partners.
b) Used to show or hide fields in customizing.
c) It can be defaulted for customers created via ICWC.
d) All of the above
e) None of the above

9) Is it possible to upload a CRM business partner to R/3 to a particular account group?

a) Yes. Maintain the account group in the business partner record.
b) Yes. Maintain the account group in the PIDE transaction.
c) Yes. Use either A or B.
d) Yes. Use all of the above.
e) No. None of the above are possible.

10) How is the R/3 account group mapped to a CRM customer in PIDE?

a) Via CRM classification to the R/3 account group
b) Via the R/3 account group
c) Via CRM grouping
d) All of the above
e) None of the above

11) How are business partner process rights controlled?

a) Maintain the authorization group in the business partner.
b) Assign the authorization group to a user.
c) All pf the above.
d) Maintain user profiles.
e) None of the above.

12) How many types of communication data can be maintained in mySAP CRM business partner record?

a) Address-dependent communication
b) Address-independent communication
c) All of the above
d) None of the above

13) The following defines the BP-relationship categories.

a) They are used to set up the relationship type between business partners.
b) The relationship between business partners could be specific to a sales area of a customer.
c) The relationship could be set up to have a validity period.
d) All of the above
e) None of the above

14) The following describes functionality of the easy enhancement workbench usage in business partner.

a) With the workbench you can extend the BP master data without modifications.
b) The workbench requires no detailed knowledge of programming and the data dictionary.
c) The workbench has a wizard to add new fields and new tables to Business partner master data.
d) The workbench enhancements are retained during the software upgrade.
e) All of the above.

15) What is a visual configuration tool?

a) A GUI tool
b) A screen-control tool
c) A BP-field and screen-control tool
d) All of the above
e) None of the above
#361
Chat Box / Re: QUIZ:"SAP"
Nov 10, 2008, 11:36 AM
Quiz: ESA, XI and the new era of integration

1. What is SOA?

The term service-oriented architecture (SOA) is being heard everywhere in IT circles these days. SOA is promising new and better computing for the future. But what does that really mean? In other words, what is SOA?

a) A platform that can be purchased from big ERP vendors like IBM, Oracle and Microsoft.
b) SOA is not a technology or a methodology, but rather, a design philosophy.
c) CORBA and DCOM are early examples of SOA.
d) Building applications with Web services will always result in SOA.


2. Elements of EAI

The Enterprise Application Integration (EAI) is a long-kept dream in the world of computing. Getting everything everywhere connected is the goal -- the production line should report to ERP just as well as the stock meter reports when it is time to reorder material. Which of the following is not necessarily part of a modern EAI technology?

a) Message Queue
b) Java Run Time
c) Workflow processor
d) HTTP server


3. The ESA paradigm

At SAPPHIRE 2005 in Boston, SAP CEO Henning Kagermann proclaimed the new era of ESA as the future paradigm of SAP. What integration paradigms does ESA support?

a) Service-orientated architecture (SOA)
b) Message-driven architecture
c) Event-driven architecture
d) Model-driven architecture


4. Event-driven architecture

The event-driven architecture is another term often heard in ESA and EAI circles. Event-driven architecture (EDA) ...

a) Is a new approach to integration that makes use of peer-to-peer communications to handle events throughout the extended enterprise.
b) Uses a higher-level business process management application that enables applications to be monitored and inter-connected using a mixture of pre-defined Web service endpoints and events.
c) Is a relatively new approach to integration that uses a mixture of open standards, loose coupling and dynamic discovery features of Web services to implement complex EAI scenarios.
d) Is an enterprise software infrastructure model in which events trigger the real-time exchange of messages between independent software applications.


5. Topology of the ESA/SOA

ESA and SOA have catapulted themselves into the integration arena and are remolding the way business will be conducted in the future. Choreographing how the different components, services and systems within your enterprise will fit together within the new SOA can be a very daunting task, but one that you will need to face head on. What is the typical topology of a modern service-oriented architecture (SOA)?

a) One central application server connected via remote desktops like CITRIX or Microsoft Terminal Server.
b) One central application server with intelligent clients, like the SAPGUI
c) One central application server with Web browser front-end applications
d) Many independently-operating application servers for dedicated applications that send their data in a front-end independent format like XML


6. The Enterprise Server Bus

The Enterprise Service Bus (ESB) is a technology offered by a number of SAP's competitors. What makes the ESB so intriguing? Or is it just marketing babble? The Enterprise Service Bus is:

a) Another word for Middleware
b) A commercial product sold by IBM
c) An event-driven approach to handle messages and workflows
d) More proficient in possibilities than a classical middleware


7. EAI best practices

Every project success is essentially based on applying best practices, or patterns and operations that have proven to be successful in the past. Many EAI projects fail to meet initial expectations because they are delivered late and/or over budget. In order to reduce the likelihood of failure, certain project management "best practices" can be followed. Which of the following can be considered "EAI best practices"?

a) Performance profile the solution early on
b) Make sure the solution is "traceable"
c) Value the "human factor" at the same level as technical decisions
d) Define clear and strict milestones and deliverables


8. Standards for Web service choreography

Language is the heart of communication and orderly collaboration. There are languages to describe an object, a state and data flow. Some languages are designed to talk to all Web services in order to avoid conflicts and give them right indication in which sequence they need to be executed. Which standard has emerged onto the integration scene to provide the "glue" required to orchestrate Web service scenarios?

a) XML
b) BPEL
c) XSLT
d) WML


9. SAP and Java

When talking about NetWeaver, an inevitable question always arises. Is SAP shifting from ABAP to Java technologies? If so, why would they want to do this? Why did SAP create a Java engine parallel to the ABAP engine?

a) Java is more stable and reliable
b) Java is a public standard in universities
c) Java language is much more powerful than ABAP
d) The SAP Java Engine will attract the Java developer to use SAP in parallel to the ABAP engine.


10. SOAP and WSDL

SOAP and WSDL are languages that allow proper remote program calls from one program to a disparate Web service. An ESB is an "architectural stack of technologies" that works together to enable developers and architects alike to create intelligent, adaptable applications that can automate business processes and interactions between multiple systems and organizations. One may argue that a combination of SOAP/HTTP and WSDL can be used as an "alternative ESB," but this is not the case. Which of the following could be considered valid arguments for why the combination of SOAP/HTTP and WSDL fall short of being a true ESB?

a) The scenario requires each participating application to be SOAP/HTTP enabled. An ESB, on the other hand, provides support for alternative integration techniques
b) Service addressing and routing is typically controlled in client code. Therefore the SOAP/HTTP style is more a "point-to-point" integration style
c) Both SOAP and WSDL carry semantic information, while an ESB should manage messages regardless of their contents
d) There is no way to substitute the implementation of one service provider over another without changing the service requesters (client) code. The code typically invokes the service/s over a specific protocol and aims at a specific address.


11. Mobile Infrastructure

The value proposition of mobile computing lies in the cost and freedom that mobile computing delivers. Remember the last time you returned a rental car and the agent scanned it back in and printed you an invoice right then and there? That is mobile computing. In order to connect a mobile scanner with WLAN capability to an existing R/3 installation you need:

a) To install SAP Mobile Infrastructure
b) Use an RFC-enabled software written for the mobile device
c) SAP XI
d) A wireless access point connected to the SAP Application Server


12. XML

XML became the "lingua franca" of Web services and business-to-business communication. In order to exchange data with SAP R/3 via XML you can use...

a) SAP XI
b) SAP Business Connector
c) A WebAS BSP Applications
d) Java Connector


13. Business Process Management

Business Process Management (BPM) is the ability to have end-to-end visibility and control over transactions/processes that span multiple applications and people in one or more companies. Which one of the following is capable of providing business modeling capabilities within the SAP NetWeaver BPM environment?

a) SAP XI
b) ARIS for SAP NetWeaver
c) SAP Solution Manager
d) WebDynpro


14. Business Activity Monitoring (BAM)

BAM is now a chic technology for managers to see the benefits of applications working seamlessly together. Which of the following is true for BAM?

a) A tight connection between BPM ("Business Process management") and BAM is the key to true business process optimization.
b) Accumulates real-time operational information to give managers (and users alike) the ability to make business process improvements that will inevitably impact business value.
c) BAM can be seen as part business intelligence, part network and part system management and monitoring.
d) EDA plays no real part in BAM


15. Is XI necessary to enable SAP for ESA?

One of the best-kept secrets in the SAP arena is the capability of XI. What is promise, what is reality and what are misunderstandings? In other words, which statement holds true for SAP XI?

a) XI will be needed to exchange data between R/3 and legacy systems
b) It can replace the SAP Business Connector
c) It will replace IDocs and ALE
d) It enables SAP for the Enterprise Service Bus

#362
Chat Box / Re: QUIZ:"SAP"
Nov 10, 2008, 11:35 AM
Quiz: Duet 101

1. The first version of Duet (released June 2006) runs on:

a) MS Outlook only
b) MS Excel only
c) MS Outlook, Excel and Word, but not Access and PowerPoint
d) The entire MS Office suite

2. What back-end data stores does Duet presently work with besides SAP?

a) None
b) Siebel
c) Salesforce.com
d) Anything web-enabled; even hybrid third-party solutions work with some tweaking

3. You need this in order to run Duet:

a) SAP R/3 4.7 Enterprise and Microsoft Exchange Server
b) SAP R/3 4.7 Enterprise and Windows Server 2003
c) mySAP ERP 2004 and Microsoft Exchange Server
d) mySAP ERP 2004, NetWeaver, Microsoft Exchange Server, and Windows Server 2003

4. What is covered in the first release of Duet?

a) Leave Management, Time Management, CRM and ESS
b) Leave Management, Time Management, CRM, ESS and Organization Management
c) Leave Management, Time Management, Organization Management and Budget Monitoring
d) Leave Management, Time Management, Organization Management and CRM

5. "Smart tags" are...

a) Customized bookmarks for the Leave Management functionality of Duet with mySAP HR
b) An MS Word feature that will enable Duet users to edit relevant SAP data instantly
c) Part of the Project Argo search feature that will be integrated into Duet in 2007
d) The basis of the "Oracle killer" memory technique that makes relational databases obsolete

6. The first version of Duet is English-only. What languages are covered in Value Pack 1?

a) German, French, Chinese and Spanish
b) German, French, Japanese, Spanish and Portuguese
c) German, French, Chinese, Japanese, Spanish, Italian and Russian
d) Klingon

7. This statement is NOT true:

a) The Duet architecture includes an add-on to MS Office on the user's client machine
b) The Duet architecture adds a separate box called the 'Client-backend server'
c) MS Windows .NET Framework 2.0 is installed as part of the client setup
d) You must run Windows Server 2003 SP1 or higher to use Duet

8. SAP add-on and backend requirements: what is the minimum disk space needed for installing Duet?

a) 500 Mb
b) 1 Gb
c) 2 Gb
d) 4 Gb

9. SAP has announced three new scenarios to appear in Value Pack 1, due out late 2006. These are...

a) Recruitment management, Sales management and Reports/analytics
b) Recruitment management, Travel management and Sales management
c) Recruitment management, Purchasing management and Sales management
d) Recruitment management, Travel management and Reports/analytics

10. The code name for Duet used to be...

a) "Mendocino"
b) "Foghorn"
c) "Virsa"
d) "D'k tagh"
#363
Chat Box / Re: QUIZ:"SAP"
Nov 10, 2008, 11:33 AM
Quiz: BW reporting

1. What are the primary reporting environments for SAP BW?

a) BEx Analyzer
b) BEx Access
c) Web browser
d) Windows Notepad

2. Which of the following types of links can be created from within the BEx Browser?

a) Folders
b) SAP transaction codes
c) Internet addresses
d) All of the above

3. True or False? You can insert your own HTML code with the Web Application Designer.

a) True
b) False

4. What is the transaction code RSBBS to be used for?

a) Listing current BW users
b) Creating a bulletin board system for reports
c) Maintaining sender-receiver assignments
d) Reloading data into an InfoCube

5. Which of the following is true of the Business Explorer (BEx) Analyzer?

a) It is integrated with Microsoft Excel.
b) It allows multiple queries to be embedded into a single worksheet/workbook.
c) It can refresh queries automatically when a workbook is opened.
d) It has protection to prevent changes to cell values.
e) All of the above.

6. Individual cell definitions can be created when a Query Definition has how many structures?

a) 0 Structures
b) 1 Structure
c) 2 Structures
d) More than 2 structures

7. What is RRI?

a) A really-really-interesting acronym
b) Report-report-interfacing
c) A transaction code for creating new InfoCubes

8. Which of the following can be shared amongst query designers within a single InfoProvider?

a) Characteristic variables
b) Global structures
c) Restricted key figures
d) Technical names of a query

9. True or False? The reporting agent can be used to pre-calculate Web templates.

a) True
b) False

10. A combination of characteristics and key figures can be displayed in any desired order by:

a) Activating the download scheduler
b) Switching a query definition to tabular mode
c) Placing key figures in the rows section of a query definition
d) Using scissors and duct tape

11. True or False? Characteristic variables cannot be created directly from the Query Designer tool.

a) True
b) False

12. What SAP transaction code can access the reporting agent?

a) RSA1
b) AL08
c) RSRT
d) RSREP

13. The Web Application Designer (WAD) allows which of the following to be displayed in a Web browser?

a) Query results in a table.
b) A corporate logo
c) Bar charts.
d) Links to other reports.
e) All of the above.

14. A query that is not ready to be shared with other users should be saved to:

a) The BEx Browser
b) Favorites
c) Roles
d) A local PC

15. Characteristics found in a query definition can be restricted by:

a) Opening the administrator workbench
b) Changing the query properties within the query designer
c) Double-clicking on the characteristic in the query definition
d) Creating a calculated key figure
#364
Chat Box / Quiz:"SAP"
Nov 10, 2008, 11:31 AM
Quiz: Back to basics with mySAP SRM

1. True or False: The terms Supplier Relationship Management (SRM) and Enterprise Buyer (EBP) are the same, and can be used interchangeably.

a) True
b) False

2. Which of the following is not a standard scenario available for SRM:

a) Self Service Procurement
b) Plan Driven Procurement
c) Service Procurement
d) Extended Classic Scenario
e) Catalog Content Management
f) Spend Analysis
g) Strategic Sourcing

3. The following technical component(s) is/are mandatory for the Self Service Scenario in SRM 5.0:

a) SAP SRM Server 5.5
b) SAP Catalog Content Management 2.0 (CCM)
c) XI Content for SAP SRM Server 5.5
d) Live Auction Cockpit (LACWPS) 5.0

4. Which of the following reports update the status of the follow-on documents within the shopping cart history?

a) BBP_GET_STATUS_2
b) CLEAN_REQREQ_UP
c) RSWUWFMLEC
d) BBP_BW_SC2

5. What is the function of the RSWUWFMLEC report in EBP?

a) To transfer purchase orders from EBP to the back-end system in a standalone scenario.
b) To allow printing of the shopping cart.
c) To send notifications for work items via e-mail to e-mail recipients.
d) To provide the ability for approval preview in the shopping cart.

6. The following statements are true for the Extended Classic Implementation scenario:

a) The leading document is created in SRM and a copy of the document is transferred to the back-end SAP system.
b) The follow-on documents of confirmation and invoice can only be entered in the SAP back-end system.
c) The purchase order can be changed in SAP R/3.
d) The SAP Portal is not compatible with the Extended Classic Implementation scenario of SRM.

7. Which of the following statements are correct about the organization structure in EBP?

a) SRM users can be created simply by using the SU01 transaction.
b) An organization structure is required. The self service scenario cannot be implemented without the organization structure.
c) The inheritance administration of attributes from PPOMA can be configured in table T77OMATTR.
d) The report BBP_CHECK_CONSISTENCY checks the consistency of the organization plan.

8. What statement(s) is correct regarding Plan Driven Procurement in SRM?

a) It is one of the business scenarios in SRM.
b) It only supports the sourcing or procurement of requirements generated in APO.
c) The requirements created in the back-end system can be transferred to EBP where a shopping cart is created, and can then utilize the workflow start conditions rules to get approval(s).
d) The report BBP_EXTREQ_TRANSFER is utilized in the SAP backend to transfer the relevant requisitions to EBP.

9. Which of the following is true concerning the workflows in SRM?

a) There is only one workflow template provided by SAP for the shopping cart workflow. All others need to be customized based on the project.
b) The approval preview allows the end user to visualize all required approvals in a graphical and tabular format.
c) As an alternative to the workflows supplied in the standard system, you can use the SLAPPROVER workflow to ensure more flexible assignment of users. This is a one-step approval workflow.
d) "Ad-hoc" approval functionality provides the ability to dynamically insert approvers or reviewers within the approval chain for a document.

10. What elementary step(s) is/are associated with workflow customizing in SRM?

a) The workflows to be used have to first be activated in customizing.
b) The organization buffer of the organizational plan has to be refreshed first, using the transaction SWU_OBUF.
c) The IMG activity, "Maintain Standard Settings for SAP Business Workflow" can be configured by any user with access to this transaction.
d) Workflow start conditions need to be configured by business objects (eg. BUS2121 for the shopping cart).

11. What does the transaction "BBPGETVD" do?

a) It transfers the materials from the back-end SAP R/3 system into EBP.
b) It transfers the terms of payment of the vendors from the backend into EBP.
c) It replicates the vendors from the back-end system into the vendor organization (PPOMA_BBP).
d) All vendor master records are transferred from the backend and the business partner numbers are entered for these vendors in EBP.

12.Which statement(s) concerning master data in SRM is/are correct?

a) Material Master Data is transferred from the SAP backend to EBP using middleware.
b) Product Categories correspond to material groups in the SAP backend.
c) Business partner master records correspond to the vendor master records in the SAP backend.
d) The vendors are downloaded into SRM from the SAP backend via the middleware.

13. What statements pertaining to the OCI interface are correct?

a) OCI allows organizations to connect their EBP systems with online catalogs like Office Depot, Dell, and Grainger and transfer their catalog data into the EBP shopping carts.
b) OCI describes the data exchange between the EBP and external catalog applications.
c) The OCI is the Open Content Interface that ensures that the correct content is transferred to EBP from the catalog.
d) If products are contained in the catalog and are already maintained in the product master, EBP does not require any inbound parameters for transfer of the product data, since this data is already known in EBP.
e) The OCI interface contains inbound and outbound parameters.

14. Which of the following are correct as of release SRM 4.0?

a) Customer-specific fields can be created for the shopping cart, purchase order, and contract documents in SRM.
b) The procurement card functionality in EBP can be implemented in the Classic and Extended Classic scenario.
c) ITS can now be utilized integrated with the Web Application Server 6.40. This can decrease the total cost of ownership (TCO).
d) Archiving documents is not supported in SRM.

15. What statements pertaining to the account assignment in SRM are correct?

a) A real-time validation occurs in the SAP back-end system.
b) A G/L account has to be assigned to the product category for the validation of the accounts.
c) A local validation in EBP independent of a back-end system is also possible.
d) The only account assignment categories available in SRM are Cost Center (CC) and Asset (AS).
#365
There is much to consider if you plan to migrate from Visual Basic 6 to Visual Basic .NET -- how long it will take, what needs to be done to your code base and whether an application will work the same once it is in .NET. There are also differences between the languages that must be considered. This quiz addresses some of the questions that will come up as you contemplate a VB 6-to-VB.NET migration.

1. If you know you want to migrate your Visual Basic 6 application to VB.NET, what is the first thing you should do?
A) Open the Visual Basic Upgrade Wizard, get a cup of coffee and watch it run.
B) Assess the VB 6 application; find out what controls it uses, what projects are in there and so on.
C) Cancel all social plans for the next couple months and start rewriting the app in .NET.
D) Schedule meetings with end users to see what features they want to add to the app.

2. Some bits of a Visual Basic 6 application, like most APIs, can be easily migrated to VB.NET; other parts are not so straightforward. Which of the following will NOT have to be re-architected during a VB 6-to-VB.NET migration?
A) DHTML pages
B) ActiveX documents
C) OLE controls
D) ADO to ADO via Interop

3. True or False: The Visual Basic Upgrade Wizard will convert all the code in your VB 6 application to VB.NET code for you.
A) True
B) False

4. Does the Visual Basic Upgrade Wizard support ASP to ASP.NET migrations?
A) Yes, in all cases.
B) Yes, in some cases.
C) No, not at all.

5. Which of the following is the LEAST compelling reason to migrate an application from Visual Basic 6 to Visual Basic .NET?
A) You want to take advantage of ASP.NET features such as its caching abilities.
B) The application relies heavily on third-party controls or dynamic link libraries (DLLs).
C) The application's original developers were new to Visual Basic and/or used some "out of the box" development approaches.
D) Your company's business processes do not change all that often.
E) The application uses COM+ components in a high-traffic Web environment.

Now that we've looked at migrating applications, we're going to consider migrating you the developer. See what you know about some of the differences between VB 6 and VB.NET and how to prepare yourself.

6. This programming language model is used sparingly in VB 6 but is one of the cornerstones of VB.NET. Knowing the ins and outs of it will make an application migration project easier and also prepare you for additional work in VB.NET. What is the model?
A) Modular programming
B) Aspect-oriented programming
C) Object-oriented programming
D) Reflective programming

7. As expected, Visual Basic 2005 comes with lots and lots of improvements over VB 6 and VB 2003. Which of the following is NOT out-of-the-box functionality in Visual Basic 2005?
A) Refactoring
B) Debugger ToolTips
C) Code snippets
D) Snap lines for graphical form-building

8. Data query building can sometimes be a bone of contention for VB 6 developers, since it involves SQL or XQuery. Microsoft is introducing a series of changes to the .NET Framework, such as a unified programming model for querying objects, databases and XML, that should make data queries much easier. What is the name for this set of technologies?
A) Rosario
B) Orcas
C) Yukon
D) LINQ

9. When Visual Studio 2005 and SQL Server 2005 were introduced to the world, Microsoft decided to revamp its certification process. Once Windows Vista is released, the titles of Microsoft Certified Professional (MCP), Microsoft Certified Application Developer (MCAD), and Microsoft Certified Solution Developer (MCSD) will no longer apply. Which of the following titles is NOT a category in Microsoft's new three-tiered certification framework?
A) Microsoft Certified Application Developer
B) Microsoft Certified Technology Specialist
C) Microsoft Certified Architect
D) Microsoft Certified IT Professional

10. You and a friend from college, who works at a company across town, get together for dinner. You explain that you are in the middle of a VB 6-to-VB.NET migration and indicate that it is a bit of a challenge. Your friend says, "You should've just migrated to C#. It's cheaper and easier." Is your friend right?
A) Yes
B) No
#366
Chat Box / ""R O B O T ""
Nov 10, 2008, 11:19 AM
WHAT IS robot???

A robot is a machine designed to execute one or more tasks repeatedly, with speed and precision. There are as many different types of robots as there are tasks for them to perform.

A robot can be controlled by a human operator, sometimes from a great distance. But most robots are controlled by computer, and fall into either of two categories: autonomous robots and insect robots. An autonomous robot acts as a stand-alone system, complete with its own computer (called the controller). Insect robots work in fleets ranging in number from a few to thousands, with all fleet members under the supervision of a single controller. The term insect arises from the similarity of the system to a colony of insects, where the individuals are simple but the fleet as a whole can be sophisticated.

Robots are sometimes grouped according to the time frame in which they were first widely used. First-generation robots date from the 1970s and consist of stationary, nonprogrammable, electromechanical devices without sensors. Second-generation robots were developed in the 1980s and can contain sensors and programmable controllers. Third-generation robots were developed between approximately 1990 and the present. These machines can be stationary or mobile, autonomous or insect type, with sophisticated programming, speech recognition and/or synthesis, and other advanced features. Fourth-generation robots are in the research-and-development phase, and include features such as artificial intelligence, self-replication, self assembly, and nanoscale size (physical dimensions on the order of nanometers, or units of 10-9 meter).

Some advanced robots are called androids because of their superficial resemblance to human beings. Androids are mobile, usually moving around on wheels or a track drive (robots legs are unstable and difficult to engineer). The android is not necessarily the end point of robot evolution. Some of the most esoteric and powerful robots do not look or behave anything like humans. The ultimate in robotic intelligence and sophistication might take on forms yet to be imagined.

The term robot first appeared in a 1920 play by Czech writer Karel Capek, R.U.R.: Rossum's Universal Robots. In the play, the robots eventually overthrow their human creators. The Czech word "robota" means "forced labor".
#367
Chat Box / what is REAL TIME?
Nov 10, 2008, 11:00 AM
Real time is a level of computer responsiveness that a user senses as sufficiently immediate or that enables the computer to keep up with some external process (for example, to present visualizations of the weather as it constantly changes). Real-time is an adjective pertaining to computers or processes that operate in real time. Real time describes a human rather than a machine sense of time.

In the days when mainframe batch computers were predominant, an expression for a mainframe that interacted immediately with users working from connected terminals was online in real time.
#368
Chat Box / what is REAL TIME CLOCK?
Nov 10, 2008, 10:57 AM
A real-time clock (RTC) is a battery-powered clock that is included in a microchip in a computer motherboard. This microchip is usually separate from the microprocessor and other chips and is often referred to simply as "the CMOS" (complementary metal-oxide semiconductor). A small memory on this microchip stores system description or setup values - including current time values stored by the real-time clock. The time values are for the year, month, date, hours, minutes, and seconds. When the computer is turned on, the Basic Input-Output Operating System (BIOS) that is stored in the computer's read-only memory (ROM) microchip reads the current time from the memory in the chip with the real-time clock.
#369
hi velmurugan,

thanks for contributing this post.

keep posting...
#370
Gift / Prizes Request / topup request
Nov 08, 2008, 07:16 PM
User Name : manimarank
Date  : 08 nov 08
Status : normal
Postcount : 52
Information : airtel prepaid inside TN
Total No of Post you made so far : Ex 674 posts : 571
Type of the Gift : Mobile Topup
Select Your Service Provider : Airtel Prepaid

Here by i declare that , before sending this request. I have verified my todays post. So Please check the topup status and confirm it.
[blink]Note : You will be given Warning if you are trying to test this Form or Found Fake[/blink]
#371
Chat Box / Re: Quiz: Web Management Basics
Nov 08, 2008, 04:51 PM
ANSWER KEY: 1c; 2c; 3a; 4b; 5b; 6a; 7a; 8b; 9d; 10b
#372
Chat Box / Quiz: Web Management Basics
Nov 08, 2008, 04:50 PM
1. This is a place to store the files for Web pages that are frequently requested (or that have been recently requested) to speed up page delivery and reduce network traffic.
a. buffer
b. capacitor
c. cache
d. incubator

2. This term means dividing the amount of work that a computer has to do between two or more computers so that more work gets done in the same amount of time and, in general, all users get served faster.
a. shared hosting
b. routing
c. load balancing
d. colocation

3. This is a program that serves the files that form Web pages to Web users. Every computer on the Internet that contains a Web site must have one of these.
a. Web server
b. autoresponder
c. application server
d. dynamic DNS service

4. This locates a specific page on the World Wide Web.
a. domain name
b. URL
c. path
d. IP address

5. This is programming that protects the resources of a private network from users from other networks.
a. cybernetics
b. firewall
c. server-side include
d. intranet

6. This is the set of markup symbols or codes inserted in a file intended for display on a World Wide Web browser page.
a. HTML
b. ASP
c. Java
d. GIF89a

7. This is a company that provides individuals and other companies access to the Internet and other related services such as Web site building and virtual hosting.
a. ISP
b. ASP
c. SAP
d. OSP

8. This is an application program that provides a way to look at and interact with all the information on the World Wide Web.
a. link checker
b. browser
c. access provider
d. avatar

9. In the Web hosting business, this refers to the rental and exclusive use of a computer that includes a Web server, related software, and connection to the Internet, housed in the Web hosting company's premises.
a. colocation
b. reseller hosting
c. virtual hosting
d. dedicated hosting

10. Using a World Wide Web browser, this is a saved link to a Web page that has been added to a list of saved links.
a. blog
b. bookmark
c. bookmark portal
d. bogie
#373
ANSWER FOR 10

The word elegant, in general, is an adjective meaning of fine quality. Refinement and simplicity are implied, rather than fussiness, or ostentation. An elegant solution, often referred to in relation to problems in disciplines such as mathematics, engineering, and programming, is one in which the maximum desired effect is achieved with the smallest, or simplest effort. Engineers, for example, seek the elegant solution as a means of solving a problem with the least possible waste of materials and effort. The elegant solution is also likely to be accomplished with appropriate methods and materials - according to the Elegant Solution Organization, duct tape is not likely to be part of an elegant solution, unless, of course, the problem involves taping ducts.
#374
ANSWER FOR 9

ripper

In digital audio technology, a ripper is a program that moves a sound sequence from a compact disk onto a computer hard drive as a Wave file , often as a step toward converting it to an MP3 -encoded file. The program that converts the WAV file to an MP3 file is known as an encoder . The program that plays the MP3 file is called a player . Some audio products provide all three programs together as a package.
#375
ANSWER FOR 8

Patch Tuesday is the second Tuesday of each month, when Microsoft releases the newest fixes for its Windows operating system and related software applications. Microsoft introduced Patch Tuesday in 2003 as a means of reducing costs associated with patch deployment. The company chose Tuesday because it was not the first day of the week, which typically has its own issues, but early enough that any ensuing problems could be dealt with before the following weekend. As a rule, patches are only sent out on that day although code fixes that are deemed to be critical may be sent at any time.

According to Microsoft, sending patches only once a month simplifies patch management. Because the date is known in advance, system administrators can plan for the day. They can also install multiple patches with a single reboot. However, many administrators find that dealing with the numbers of patches (in some cases more than 50) and associated problems can make Patch Tuesday and subsequent days overwhelmingly difficult.

There are also a number of security issues involved in issuing patches once a month. Most importantly, it means that known vulnerabilities may not be dealt with for several weeks. Furthermore, crackers can analyze patch code and exploit the vulnerabilities that the fixes were intended to deal with. As a result, the day after Patch Tuesday has become known in some circles as Exploit Wednesday.

Other effects of Patch Tuesday include surges of users coming online at the same time, which creates a strain on networks. Such a spike in usage can have a severe impact on the Internet. In August 2007, Skype blamed Patch Tuesday for a two-day outage.

Among administrators, Patch Tuesday is sometimes referred to as "Black Tuesday."
#376
ANSWER FOR 7

Mainframe computers

#377
ANSWER FOR 6

forensic animation

Forensic animation is the use of full-motion computer graphics to recreate an event such as an automobile accident, the collapse of a building, an assault, or the workings of a mechanical device from a variety of perspectives. Forensic experts, police officers, engineers, and eyewitnesses compile the data and supply it to the animators, who create a series of fixed video images that are assembled to create a cartoon-movie-like rendition of the event. Simulated audio is sometimes also used to create a short audio-visual production.

A typical sequence in forensic animation consists of 30 frames per second, and lasts for several seconds. Scenes are generated using various computer programs working in combination. The event is typically depicted from two or more vantage points. For example, a collision between a small car and a truck might portray the moments before, during, and after the collision as seen by the driver of the car and by the driver of the truck, and also as it would appear from several external locations. Each video can be recorded on analog tape so it can be played on a common videocassette machine for multiple viewers. Alternatively, the final production can be burned onto a digital video disc ( DVD ) and presented using a computer with a projection display.

The accuracy of forensic animation depends on the precision and verifiability of the data used to create it. In a car/truck accident, for example, it is important to know prior-to-impact data including the speeds of the two vehicles, the precise directions in which they were traveling, the masses of each vehicle, the points on each vehicle at which contact was first made, and whether or not (and to what extent) either vehicle was accelerating or decelerating. This data might be gathered by testimony of one or both drivers, eyewitnesses, police officers who came to the scene after the accident, and engineers who analyzed the structural damage to the vehicles and the skid marks (if any) left on the roadway. The nature and condition of the pavement, the weather, the condition of each vehicle's tires, and the reaction times of the drivers would provide important additional data. Some vehicles have on-board computers that store important information about the operation of a vehicle at various points in time. Even a slight change in one of the parameters can result in a drastic change in the outcome. Often, several different scenarios are generated based on substantially the same testimony.

Forensic animation is gaining increased acceptance in courtrooms nationwide. Realism can enhanced by the use of three-dimensional ( 3-D ) programs such as Fizt or Maya . Some attorneys are experimenting with the use of virtual reality in courtroom litigation.
#378
ANSWER FOR 5

footprint

In information technology, a footprint is the amount of space a particular unit of hardware or software occupies. Marketing brochures frequently state that a new hardware control unit or desktop display has a "smaller footprint," meaning that it occupies less space in the closet or on your desk. More recently, the term is used to describe microcomponents that take less space inside a computer and software that occupies less space in memory (whether random access memory or read-only memory ).
#379
ANSWER FOR 4

Shotgun debugging is the debugging of a program, hardware, or system problem using the approach of trying several possible solutions at the same time in the hope that one of them will work. This approach may work in some circumstances while sometimes incurring the risk of introducing new and even more serious problems.

Technicians who repair electronic equipment sometimes use this approach to solving a hardware problem. If test equipment necessary to isolate the faulty component is not available, an experienced technician may replace several components at once, knowing, from experience, that the observed trouble is nearly always caused by a malfunction of one of those components. This is an inefficient and costly method to repair hardware, but in the field, it may work temporarily.
#380
ANSWER FOR 3

A "killer app" is jargon in the computer industry for an application program that intentionally or unintentionally gets you to make the decision to buy the system the application runs on. A classic example of a killer app was the spreadsheet program, the first of which was called VisiCalc, followed later by Lotus 1-2-3. The spreadsheet application helped introduce the personal computer into the department level of large and small businesses. A killer app can refer to a generic type of application that hasn't existed before, to a particular product that first introduces a new application type, or to any application with wide appeal.

When a new kind of computer hardware product comes out, such as a hand-held computer, manufacturers offer or hope to entice others to develop what they believe will be the killer app that will motivate potential customers to buy the new computer. In recent ads, IBM says that the killer app for e-business (which is both a concept and an array of Internet products and services that IBM sells) is "an application deployed over the Web that makes it easier to do the things you already do." Clearly, the Web browser and the Internet servers it communicates with became the killer app of the 1990s.
#381
ANSWER FOR 2

A brain dump (sometimes spelled braindump, or brain-dump) is a complete transfer of accessible knowledge about a particular subject from your brain to some other storage medium, such as paper or your computer's hard drive. It is common for someone who maintains a blog, a personal journal that's shared on the Internet, to refer to the blog as a brain dump. The term brain dump can also be used in an educational context. For example, someone preparing for an exam might perform a brain dump by writing out as much information as they can remember about something they've studied.

Brain dump Web sites for exam preparation purposes are fairly common, especially for computer-related certification programs. Someone who has taken an exam might perform a brain dump by writing out as many of the questions as they remember, for distribution as a study guide for other people who intend to take the same exam. However, the practice is not encouraged by authorities, who argue that studying for only certain questions within a subject area might yield a pass on an exam, but doesn't yield any real understanding of the subject matter. Furthermore, running that type of brain dump Web site is usually illegal. In January 2003, Robert Keppel was sentenced to 12 months plus a day in prison and fined $500,000 for maintaining a brain dump (cheatsheets.com) that sold Microsoft Certified System Engineer (MCSE) and Microsoft Certified Solution Developer (MCSD) exam questions.

A more extreme interpretation of brain dumping involves the attempt to store all the knowledge in your brain on a computer. At present, this is an impossible task. However, some futurist theorists, such as Ray Kurzweil (co-developer of the first print-to-speech reading machine for the blind), believe that a post-biological age will dawn when humans cease to exist as mortal beings and live forever in virtual reality, after downloading their brains to computers.
#382
ANSWER FOR 1

The blue screen of death (BSOD), is the informal name given by users to the Windows general protection fault (GPF) error. Named in honor of the error's dreaded display image of white text on a blue background, the BSOD is generated by the operating system when it has suddenly terminated with an error. The system locks up and must be rebooted. The blue screen may include some hexadecimal values from a core dump that can potentially be used to determine what caused the crash.

The blue screen of death can strike anyone, anywhere. At the Comdex trade show, Microsoft Chairman Bill Gates encountered the blue screen during a demonstration of Windows 98. (He had a spare computer standing by.)
#383
Hot News - InFocus / Re: latest science news
Nov 08, 2008, 04:32 PM
Study Will Help Reveal Genetic Differences Between Chimps, Humans

The question of difference between chimpanzee and human genomes, which are near identical at the DNA level will be answered very soon. In what is seen as the basis which will help in further research, scientists have found areas linked to cell differentiation and immune response.

Study co-author, Richard Redon, a geneticist at the Wellcome Trust Sanger Institute said, "By looking at all the variations, we will get a catalogue, and when we find a variation in a person with a disease, it will help us understand the function of that variation.........It will help us understand better how our species emerged."

While it was known by researches that humans and chimpanzees share about 98 percent of the same genes, Redon's team looked at a relatively unstudied phenomenon known as 'copy number variation'or CNV, in which genes are randomly duplicated. Mutations are more likely to accumulate in a given type of gene when multiple copies exist, and the simultaneous application of multiple genes can provide a functional boost. Redon's team is the first to assemble maps of CNV similarities across both chimpanzees and humans, and then compare the maps to each other.

According to Redon, "It's just a start".

Melanie Babcock, an Albert Einstein College of Medicine geneticist, who has studied copy number variations in primates, called the work "fascinating."

The study that also included scientists from Arizona State University, Brigham & Women's Hospital, the University of Washington, the Howard Hughes Medical Institute and Harvard Medical School appeared in the journal Genome Research.
#384
Hot News - InFocus / Re: latest science news
Nov 08, 2008, 04:28 PM
Accident Ahead? New Software Will Enable Cars To Make Coordinated Avoidance Maneuvers

A road construction barrier falls over: The car driver can't avoid it, since there are cars on the lane next to him. In future, a new software program will enable cars to coordinate maneuvers together in dangerous situations.

A child runs across the street without paying attention to the traffic, just as a car approaches at speed. It's too late to slam on the brakes, and the driver can't swerve either, as there is another car on the neighboring lane. An accident seems inevitable. A new software program, that for the first time can help several cars to coordinate their movements together, could take the edge off such a situation in future.

The vehicles form a network via car-to-car communication and communicate automatically. "In dangerous situations, the cars can independently perform coordinated maneuvers without their drivers having to intervene. In this way, they can quickly and safely avoid one another," explains Thomas Batz, who developed the software together with his colleagues at the Fraunhofer Institute for Information and Data Processing IITB in Karlsruhe and at Karlsruhe University 's chair for interactive real-time systems.

For this system, the researchers are making use of cognitive automobiles that are autonomously driven for short periods of time. The vehicles are equipped with car-to-car communication and integrated sensors such as cameras, GPS and radar systems so that they can autonomously recognize their surroundings and avoid any potential obstacles. The vehicles form cooperative groups that can act in unison. These groups are made up of cars that are traveling in the same direction and are in radio range of one another. Since their speeds and destinations vary, they are constantly re-grouped. Every vehicle in a group automatically transmits its current position and driving situation to a car that has been designated as the group coordinator. This car gathers the information from all the other cars in its group and draws up a common relevant picture of the group's situation.

Sudden dangers, such as a child running onto the road, are recognized not only by the car directly affected but also by the group coordinator. If the car in question can neither brake nor swerve because there is another car on the lane to the right, the group coordinator steps in: It orders both vehicles to swerve to the right in a coordinated maneuver in order to avoid an accident with the child and a collision with one another. Unlike in current driver assistance systems such as the anti-lock braking system (ABS), control of the car is taken over automatically. The system is currently under development: Its group formation function has already been implemented, and the researchers are now improving its ability to recognize and assess dangerous situations and to choose appropriate driving maneuvers.
#385
Hot News - InFocus / Re: latest science news
Nov 08, 2008, 04:27 PM
Many Motorists Don't See Need To Heed Speed Limits

Research suggests U.S. motorists are growing increasingly cynical about the relevance of speed limits, and a new study indicates many motorists are more likely to think they can drive safely while speeding as long as they won't get caught.

"So the faster you think you can go before getting a ticket, the more likely you are to think safety's not compromised at higher speeds," said Fred Mannering, a professor of civil engineering at Purdue University.

Mannering used a series of mathematical equations in "multinomial logit models" to calculate probabilities based on data from a survey of 988 motorists in Tippecanoe County, Ind., where Purdue is located.

Findings generally agree with other data taken in recent years.

"For whatever reason, respect for speed limits seems to have deteriorated," Mannering said. "A 2002 survey indicated two-thirds of all drivers reported they exceeded the posted speed limit, and roughly one-third reported driving 10 mph faster than most other vehicles. These figures are even more disturbing when you consider that they're self-reported and likely to be understating the degree of speeding problems."

The Indiana survey participants were asked: "At what point do you feel speeding becomes a threat to the personal safety of you and your family?" The motorists were given three choices: 5 mph, 10 mph or 20 mph over the speed limit.

The survey was taken before and after a 2004 media campaign launched in the county stressing the dangers of speeding that included radio and newspaper messages.

Using survey data, Mannering applied a series of mathematical equations in a model to estimate the probabilities of speed and safety viewpoints for drivers in various categories.

Findings are detailed in a research paper appearing in the journal Transportation Research Part F: Traffic Psychology and Behavior, available both online and in an upcoming print edition of the journal.

"The intent of the study was to statistically assess drivers' perception of the relationship between speed limits and safety," Mannering said. "In recent decades it has become more common for speed limits to be set for political reasons rather than for safety reasons. Consequently, the motoring public seems to have increasingly begun questioning the rationality of speed limits. This is evident in observed speed data that show the majority of drivers routinely exceed posted speed limits."

Of the 988 drivers in the survey, 21 percent thought it was safe to drive up to 5 mph over the speed limit, 43 percent thought it was safe to drive up to 10 mph over and 36 percent thought it was safe to drive up to 20 mph over the speed limit.

"The new findings show that the speed enforcement is critical to motorists' safety perceptions," Mannering said. "Let's say you think enforcement is getting lax and the speed at which you think you will get a ticket goes up from 7 mph over the speed limit to 10 mph over the speed limit. If that happens, our statistical results indicate that you would be 27 percent more likely to think you can safely drive up to 20 mph over the speed limit."

The research showed the media campaign relating to the dangers of speeding had no statistically significant impact on drivers' views on speeding and safety.

Other findings showed that women who have never been stopped for speeding are 68 percent more likely to think that it's only safe to drive 5 mph over the speed limit compared to all men and other women who have been stopped for speeding. Both men and women drivers who have been stopped for speeding in the last year are about 25 percent more likely to believe that it is safe to drive up to 20 mph over the speed limit than those who have not.

"This is probably because people who habitually speed are not significantly deterred by being stopped for speeding," Mannering said. "They might become slightly more conservative, but it doesn't slow them down to the level of people who are inherently more conservative."

The findings also showed that people get progressively more conservative about speeding as they age. A 25 year-old driver is 75 percent more likely to think it is safe to drive up to 20 mph over the speed limit than a 50 year-old driver.
#386
Steven Spielberg, Will Smith Thinking Of Remaking 'Oldboy''
According to an article in Variety magazine, Steven Spielberg and Will Smith seem rather interested in making an American remake of a 2003 film 'Oldboy' directed by Korean director Park Chanwook.

A cult hit, Oldboy is the centrepiece of Chanwook's revenge trilogy, an intensely violent saga about a man held hostage for 15 long years, who is then mysteriously released and allowed to go on a brutal spree of revenge that involves eating a live octopus, commiting incest, including slicing out his own tongue.  In short, it is nothing like what either Spielberg or Will Smith do e.g. mainstream, family-friendly, sensitive pictures.

All those who are used to the mainstream fare of Spielberg and Smith, must be having a fit of apoplexy, however, sooner or later someone in Hollywood was bound to do a remake of this violent film, and with Speilberg and Smith opting to do it, at least it is not being rehashed by hacks.  The duo are both not only at the top of their respective careers as actor and director, they are also creative and able to sell even the grimmest to mainstream audiences.

With Spielberg and Smith still in early discussions to collaborate on the revenge drama, according to Variety, DreamWorks is in the midst of acquiring rights to remake the 2003 Chan-wook film.  Presumably, Smith will play the lead role in the American remake.  While, Spielberg has hinted around the bush about his next directing effort, he has had Tintin and Abraham Lincoln's biopic on his plate for a while now.

Undoubtedly, a combination of Spielberg and Smith combined can pull this off, though one can only hope no aliens form part of the film, no matter how cute E.T. was and how he tugged at our heartstrings.

#387
ANSWER KEY: 1b; 2a; 3d; 4a; 5c; 6a; 7a; 8b; 9d; 10c
#388
Chat Box / Re: Quiz: Talkin' tech turkey
Nov 08, 2008, 01:01 PM
ANSWER FOR 10

show control

Show control is a computer system, especially in the entertainment industry, that combines disparate hardware and software-controlled lighting, sound, and visual effects into a single, synchronized system. Show control is used for theater productions, rock concerts, multimedia presentations, outdoor spectacles, and similar events. A show control system may combine a number of technologies and standards such as DMX512, MediaLink, MIDI , MIDI Show Control, and various SMPTE (Society of Motion Picture and Television Engineers) standards.
#389
Chat Box / Re: Quiz: Talkin' tech turkey
Nov 08, 2008, 01:00 PM
ANSWER FOR 9

In a wireless communications orbroadcasting antenna system, the feed line connects the antenna to the receiver,transmitter, or transceiver. The line transfers radio-frequency (RF) energy from atransmitter to an antenna, and/or from an antenna to a receiver, but, if operating properly, does not radiate or intercept energy itself. There are three types of antennafeed lines, also called RF transmission lines, commonly used in wireless systems.

Coaxial line, also called coaxial cable, consists of a wire conductor surrounded by a tubular, braided metallic shield.The conductor is kept at the center of the shield by a dielectric, which is usuallysolid or foamed polyethylene. The shield is connected to RF ground, while the centerconductor carries the signal. The shield,as its name implies, prevents the electromagneticfield (EM field) inside the cable from escaping, and also prevents EM energy from enteringthe cable from outside. Coaxial cables are used at frequencies below approximately 1 gigahertz.

Parallel-wire line consists of two wires running alongside each other. At each point along the line, the RF currentin the two wires are always equal in magnitude but opposite in direction. The twowires are spaced close together in terms of the EM wavelength. Because of this, the EM fieldsfrom the two wires practically cancel out each other in the region outside the line.This prevents the line from radiating RF energy. In receiving systems, EMfields from the external environment induce RF currents that flow in the same direction ineach conductor. The receiver circuitry cancels out RF currents that flow in thesame direction in both conductors, while responding to RF currents that flow in oppositedirections. This prevents external EM fields from affecting the line. Parallel-wire line is rarely employed in commercial installations, but a prefabricatedform, called TV ribbon, is sometimes used with television receivers in fringeareas for reception of channels 2 through 13. Another type of two-wire line, knownas window line, ladder line, or open wire, is popular amongamateur radio operators and shortwave listeners.

A waveguide is a hollow, metallic tube or pipe with a circular or rectangularcross section. The diameter of the waveguide is comparable to the wavelength of theEM field. The EM field travels along the inside of the waveguide in a mannersomewhat analogous to the way sound waves propagate down a narrow tunnel. The metalstructure prevents EM fields inside the waveguide from escaping, and also preventsexternal EM fields from penetrating to the interior. Waveguides are used atmicrowave frequencies, that is, at 1 GHz and above.

Because the currents in a parallel-wire line always exactly cancel or balance eachother, this type of line constitutes a balanced feed line. Such lines workbest with antenna systems that are bilaterally symmetrical; an example is the dipole antenna. Coaxial cables andwaveguides are unbalanced feed lines. This type of line will worksatisfactorily with antennas that are not symmetrical. With the use of a transformercalled a balun (contraction of the words "balanced" and"unbalanced"), coaxial cables and waveguides can be used with symmetricalantennas.
#390
Chat Box / Re: Quiz: Talkin' tech turkey
Nov 08, 2008, 12:59 PM
ANSWER FOR 8

Bit stuffing is the insertion of one or more bits into a transmission unit as a way to provide signaling information to a receiver. The receiver knows how to detect and remove or disregard the stuffed bits.

For example, the timing or bit rate of T-carrier system signals is constantly synchronized between any terminal device and an adjacent repeater or between any two repeaters. The synchronization is achieved by detecting the transition in polarity for 1 bits in the data stream. (T-1 signalling uses bipolar signaling, where each successive bit with a value of 1 is represented by voltage with a reverse polarity from the previous bit. Bits with a value of 0 are represented by a no-voltage time slot.) If more than 15 bits in a row are sent with a 0 value, this "lull" in 1 bits that the system depends on for synchronization may be long enough for two end points to become out of synchronization. To handle this situation (the sequence of more than 15 0 bits), the signal is "stuffed" with a short, unique bit pattern (which includes some 1 bits) that is recognized as a synchronization pattern. The receiving end removes the stuffed bits and restores the bit stream to its original sequence.

In another example of bit stuffing, a standard HDLC packet begins and ends with 01111110. To make sure this sequence doesn't appear again before the end of the packet, a 0 is inserted after every five consecutive 1s.

Bit stuffing is defined by some to include bit padding, which is the addition of bits to a tranmission to make the transmission unit conform to a standard size, but is distinct from bit robbing, a type of in-band signaling.
#391
Chat Box / Re: Quiz: Talkin' tech turkey
Nov 08, 2008, 12:59 PM
ANSWER FOR 7

birdie

A birdie is a false, or phantom, signal that appears in a superheterodyne wireless receiver.  Birdies are internally generated, resulting from the outputs of the oscillators that form part of the receiver circuit.  They usually sound like unmodulated carriers -- signals with "dead air."  Occasionally they are modulated by clicks, humming sounds, or audible tones.

Birdies can occur as a result of the receiver being tuned to a frequency that is a multiple of the output frequency of one of the internal oscillators.  These signals are known as harmonics.  A birdie might also be heard at a frequency corresponding to the sum or the difference of the internal oscillator frequencies.   These signals are called mixing products.  Birdies are inevitable in any superheterodyne wireless receiver.  However, in a well-engineered receiver, most or all of the birdies occur at frequencies outside the normal range of operation, so they have little or no detrimental effect on receiver performance.

A birdie is not the same thing as a spurious response.  If a receiver picks up a signal whose transmitter is operating at a frequency other than that to which the receiver is tuned, the modulation of the unwanted signal will be heard or decoded.   In some cases, two or more strong external signals can combine in a receiver's radio-frequency amplifier, causing numerous spurious responses.  This phenomenon, called intermodulation ("intermod"), can be a problem in downtown metropolitan areas where many wireless transmitters operate simultaneously.
#392
Chat Box / Re: Quiz: Talkin' tech turkey
Nov 08, 2008, 12:58 PM
ANSWER FOR 6

Korn shell

The Korn shell is the UNIX shell (command execution program, often called a command interpreter ) that was developed by David Korn of Bell Labs as a comprehensive combined version of other major UNIX shells. Incorporating all the features of C shell ( csh ) and Tab C-shell ( tcsh ) with the script language features similar to that of the Bourne shell , the Korn shell is considered the most efficient shell. Korn, Bourne, and C are the three most commonly used UNIX shells.

The Korn shell is considered a member of the Bourne shell family and uses as its shell prompt (character displayed to indicate readiness for user input) the $ symbol. Because it is the easiest shell to use, inexperienced users usually prefer the Korn shell and, not surprisingly, it is the one most often used in commercial environments.

Sometimes known by its program name ksh , the Korn is the default shell on many UNIX systems.
#393
Chat Box / Re: Quiz: Talkin' tech turkey
Nov 08, 2008, 12:58 PM
ANSWER FOR 5

On a Web site, a breadcrumb trail is a navigation tool that allows a user to see where the current page is in relation to the Web site's hierarchy. The term breadcrumb trail comes from the story of Hansel and Gretel, who left a trail of breadcrumbs as they walked through the forest so they could trace their way back home.
#394
Chat Box / Re: Quiz: Talkin' tech turkey
Nov 08, 2008, 12:57 PM
ANSWER FOR 4

JavaBeans is an object-oriented programming interface from Sun Microsystems that lets you build re-useable applications or program building blocks called components that can be deployed in a network on any major operating system platform. Like Java applets, JavaBeans components (or "Beans") can be used to give World Wide Web pages (or other applications) interactive capabilities such as computing interest rates or varying page content based on user or browser characteristics.

From a user's point-of-view, a component can be a button that you interact with or a small calculating program that gets initiated when you press the button. From a developer's point-of-view, the button component and the calculator component are created separately and can then be used together or in different combinations with other components in different applications or situations.

When the components or Beans are in use, the properties of a Bean (for example, the background color of a window) are visible to other Beans and Beans that haven't "met" before can learn each other's properties dynamically and interact accordingly.

Beans are developed with a Beans Development Kit (BDK) from Sun and can be run on any major operating system platform inside a number of application environments (known as containers), including browsers, word processors, and other applications.

To build a component with JavaBeans, you write language statements using Sun's Java programming language and include JavaBeans statements that describe component properties such as user interface characteristics and events that trigger a bean to communicate with other beans in the same container or elsewhere in the network.

Beans also have persistence, which is a mechanism for storing the state of a component in a safe place. This would allow, for example, a component (bean) to "remember" data that a particular user had already entered in an earlier user session.

JavaBeans gives Java applications the compound document capability that the OpenDoc and ActiveX interfaces already provide.
#395
Chat Box / Re: Quiz: Talkin' tech turkey
Nov 08, 2008, 12:56 PM
ANSWER FOR 3

pi

Pi is a numerical constant that represents the ratio of a circle's circumference to its diameter on a flat plane surface.The value is the same regardless of the size of the circle. The decimal expansion of pi is a nonterminating, nonrepeating sequence of digits. For most calculations, the value can be taken as 3.14159. This means, for example, that a circle with a diameter of 10 centimeters, as measured on a flat surface, has a circumference of approximately 31.4159 centimeters.

The number pi is also the ratio of the diameter of a sphere to the length of any great circle (geodesic) on the sphere.So, for example, if the earth is considered to be a perfect sphere with a diameter of 8,000 miles, then the distance around the earth, as measured along the equator or along any great circle, is approximately 8,000 x 3.14159, or 25,133 miles.

Pi is an irrational number.It cannot be precisely defined as the ratio of any two whole numbers.Thus, its decimal expansion has no pattern and never ends.The first few hundred, thousand, million, or billion digits of pi can be calculated using a computer to add up huge initial sequences of the terms of an infinite sum known as a Fourier series.Mathematically, it can be shown that the following equation holds:

pi.gif (360 bytes)

The symbol to the left of the equal sign is the lowercase Greek letter used in mathematics, physics, and engineering to represent pi.
#396
Chat Box / Re: Quiz: Talkin' tech turkey
Nov 08, 2008, 12:54 PM
ANSWER FOR 2

In computer programming, a table is a data structure used to organize information, just as it is on paper. There are many different types of computer-related tables, which work in a number of different ways. The following are examples of the more common types.

I) In data processing, a table (also called an array) is a organized grouping of fields. Tables may store relatively permanent data, or may be frequently updated. For example, a table contained in a disk volume is updated when sectors are being written.

2) In a relational database, a table (sometimes called a file) organizes the information about a single topic into rows and columns. For example, a database for a business would typically contain a table for customer information, which would store customers' account numbers, addresses, phone numbers, and so on as a series of columns. Each single piece of data (such as the account number) is a field in the table. A column consists of all the entries in a single field, such as the telephone numbers of all the customers. Fields, in turn, are organized as records, which are complete sets of information (such as the set of information about a particular customer), each of which comprises a row. The process of normalization determines how data will be most effectively organized into tables.

3)A decision table (often called a truth table), which can be computer-based or simply drawn up on paper, contains a list of decisions and the criteria on which they are based. All possible situations for decisions should be listed, and the action to take in each situation should be specified. A rudimentary example: For a traffic intersection, the decision to proceed might be expressed as yes or no and the criteria might be the light is red or the light is green.

A decision table can be inserted into a computer program to direct its processing according to decisions made in different situations. Changes to the decision table are reflected in the program.

4)An HTML table is used to organize Web page elements spatially or to create a structure for data that is best displayed in tabular form, such as lists or specifications.
#397
Chat Box / Re: Quiz: Talkin' tech turkey
Nov 08, 2008, 12:52 PM
ANSWER FOR 1

mouse potato

A mouse potato is the computer equivalent of television's couch potato : someone who tends to spend a great deal of leisure time in front of the computer in much the same way the couch potato does in front of the television. Both activities tend to be accompanied by snacking. A recent survey by the American Snack Food Association found that 85% of Web surfers snack at the computer. It has been observed that this habitual nibbling and relative inactivity can lead to development of a characteristic potato-like body form.

Television networks are concerned about the new phenomenon; they want to keep their potatoes planted on the couch. The Web's main lure - and what television has been lacking - is the capacity for interaction, something that will be increasingly built into television broadcasting with the move to digital television and the cable modem . The convergence of television and the computer could perhaps be viewed as the convergence of the couch potato and the mouse potato.
#398
Chat Box / Re: Quiz: SQL Server 2000
Nov 08, 2008, 12:51 PM
ANSWER KEY: 1) i ; 2) d ; 3) h ; 4) l ; 5) b ; 6) j ; 7) g ; 8 n ; 9) o ; 10) m
#399
Chat Box / Re: Quiz: Nano, nano!
Nov 08, 2008, 12:45 PM
ANSWER FOR 10

spintronics

Spintronics is an emerging field of nanoscale electronics involving the detection and manipulation of electron spin . This is in contrast to conventional electronics, which deals only with the accumulation and movement of charge carrier s. Spintronics is of interest to engineers and manufacturers of semiconductor devices, particularly integrated circuits ( IC s), which are used in most electronic devices and systems, including computers.

Electron spin can be detected as a magnetic field having either of two orientations, known as down and up. This provides an additional two binary states to the conventional low and high logic values, which are represented by simple current s. With the addition of the spin state to the mix, a binary digit (or bit) can have four possible states, which might be called down-low, down-high, up-low, and up-high. These four states are called quaternary digits, or qubit s for short.

Spintronic technology has been tested in mass-storage components such as hard drive s. The technology also holds promise for digital electronics in general. The existence of four, rather than two, defined states for a logic bit translates into higher data transfer speed, greater processing power, increased memory density, and increased storage capacity, provided the properties of electron spin can be "tamed" for practical applications.
#400
Chat Box / Re: Quiz: Nano, nano!
Nov 08, 2008, 12:45 PM
ANSWER FOR 9

qubit

A qubit is a quantum bit , the counterpart in quantum computing to the binary digit or bit of classical computing. Just as a bit is the basic unit of information in a classical computer, a qubit is the basic unit of information in a quantum computer .

In a quantum computer, a number of elemental particles such as electrons or photons can be used (in practice, success has also been achieved with ions), with either their charge or polarization acting as a representation of 0 and/or 1. Each of these particles is known as a qubit; the nature and behavior of these particles (as expressed in quantum theory ) form the basis of quantum computing. The two most relevant aspects of quantum physics are the principles of superposition and entanglement .

Superposition
Think of a qubit as an electron in a magnetic field. The electron's spin may be either in alignment with the field, which is known as a spin-up state, or opposite to the field, which is known as a spin-down state. Changing the electron's spin from one state to another is achieved by using a pulse of energy, such as from a laser - let's say that we use 1 unit of laser energy. But what if we only use half a unit of laser energy and completely isolate the particle from all external influences? According to quantum law, the particle then enters a superposition of states, in which it behaves as if it were in both states simultaneously. Each qubit utilized could take a superposition of both 0 and 1. Thus, the number of computations that a quantum computer could undertake is 2^n, where n is the number of qubits used. A quantum computer comprised of 500 qubits would have a potential to do 2^500 calculations in a single step. This is an awesome number - 2^500 is infinitely more atoms than there are in the known universe (this is true parallel processing - classical computers today, even so called parallel processors, still only truly do one thing at a time: there are just two or more of them doing it). But how will these particles interact with each other? They would do so via quantum entanglement.
Entanglement
Particles that have interacted at some point retain a type of connection and can be entangled with each other in pairs, in a process known as correlation . Knowing the spin state of one entangled particle - up or down - allows one to know that the spin of its mate is in the opposite direction. Even more amazing is the knowledge that, due to the phenomenon of superposition, the measured particle has no single spin direction before being measured, but is simultaneously in both a spin-up and spin-down state. The spin state of the particle being measured is decided at the time of measurement and communicated to the correlated particle, which simultaneously assumes the opposite spin direction to that of the measured particle. This is a real phenomenon (Einstein called it "spooky action at a distance"), the mechanism of which cannot, as yet, be explained by any theory - it simply must be taken as given. Quantum entanglement allows qubits that are separated by incredible distances to interact with each other instantaneously (not limited to the speed of light). No matter how great the distance between the correlated particles, they will remain entangled as long as they are isolated.

Taken together, quantum superposition and entanglement create an enormously enhanced computing power. Where a 2-bit register in an ordinary computer can store only one of four binary configurations (00, 01, 10, or 11) at any given time, a 2-qubit register in a quantum computer can store all four numbers simultaneously, because each qubit represents two values. If more qubits are added, the increased capacity is expanded exponentially.


#401
Chat Box / Re: Quiz: Nano, nano!
Nov 08, 2008, 12:44 PM
ANSWER FOR 8

nanotechnology

Nanotechnology, or, as it is sometimes called, molecular manufacturing , is a branch of engineering that deals with the design and manufacture of extremely small electronic circuits and mechanical devices built at the molecular level of matter. The Institute of Nanotechnology in the U.K. expresses it as "science and technology where dimensions and tolerances in the range of 0.1 nanometer (nm) to 100 nm play a critical role." Nanotechnology is often discussed together with micro-electromechanical systems ( MEMS ), a subject that usually includes nanotechnology but may also include technologies higher than the molecular level.

There is a limit to the number of components that can be fabricated onto a semiconductor wafer or "chip.". Traditionally, circuits have been etched onto chips by removing material in small regions. However, it is also possible in theory to build chips up, one atom at a time, to obtain devices much smaller than those that can be manufactured by etching. With this approach, there would be no superfluous atoms; every particle would have a purpose. Electrical conductors, called nanowire s, would be only one atom thick. A logic gate would require only a few atoms. A data bit could be represented by the presence or absence of a single electron .

Nanotechnology holds promise in the quest for ever-more-powerful computers and communications devices. But the most fascinating (and potentially dangerous) applications are in medical science. So-called nanorobot s might serve as programmable antibodies. As disease-causing bacteria and viruses mutate in their endless attempts to get around medical treatments, nanorobots could be reprogrammed to selectively seek out and destroy them. Other nanorobots might be programmed to single out and kill cancer cells.

Two concepts associated with nanotechnology are positional assembly and self-replication . Positional assembly deals with the mechanics of moving molecular pieces into their proper relational places and keeping them there. Molecular robots are devices that do the positional assembly. Self-replication deals with the problem of multiplying the positional arrangements in some automatic way, both in building the manufacturing device and in building the manufactured product.
#402
Chat Box / Re: Quiz: Nano, nano!
Nov 08, 2008, 12:44 PM
ANSWER FOR 7

gray goo

Gray goo (or, in British spelling, "grey goo") is a term used to describe what life on our planet might become if self-replicating robot s or nanomachine s got out of control and began to use up life forms for their own energy needs in some unstoppable way. The term was first used in K. Eric Drexler in his seminal book about nanotechnology , Engines of Creation . Michael Crichton's Prey is one of several science fiction novels about gray goo catastrophes. The possibility of all of us becoming a lifeless conglomeration of gray goo, whether by accident or by robotic intent, is considered exceedingly unlikely. However, it has been taken seriously enough by one researcher, Robert Freitas, to suggest some public policy recommendations.

In self-replication at the "nano" or molecular level, some source of energy would be needed and it would seem that these would be the same sources used by life forms or from life forms themselves (just as human beings derive energy from eating other animals that have obtained their energy from lower life forms). In the competition for energy with nanomachines, human beings might find themselves unable to adapt quickly enough through natural evolution, ultimately falling prey to their own intellectual creations.

A significant argument against the possibility of a gray goo situation is that engineers should be able to build in limiting conditions for self-replication. One writer, Chris Phoenix, says that it is as unlikely that a molecular manufacturing system could degenerate into unstoppable self-replication as that a drill press or lathe might self-replicate. Phoenix refers to nanorobots that self-replicate only for the limited purpose of a specific task, such as cleaning and closing a wound, as paste .
#403
Chat Box / Re: Quiz: Nano, nano!
Nov 08, 2008, 12:43 PM
ANSWER FOR 6

self-replication

In nanotechnology , self-replication is a process in which devices whose diameters are of atomic scale, on the order of nanometers, create copies of themselves. A nanometer is 10 -9 meter or a millionth of a millimeter. In order for self-replication to take place in a constructive manner, three conditions must be met.

The first requirement is that each unit be a specialized machine called a nanorobot, one of whose functions is to construct at least one copy of itself during its operational life. (Each unit should also have some other function, unless the intended purpose of the aggregate is to cause havoc by generating the mechanical equivalent of a cancerous tumor.) A hypothetical example of a constructively self-replicating nanorobot is an artificial antibody. In addition to reproducing itself, it seeks and destroys disease-causing organisms.

The second requirement is the existence of all the energy and ingredients necessary to build a certain minimum number of complete copies of the nanorobot in question. Ideally, the quantities of each ingredient should be such that they are consumed in the correct proportion. If the process is intended to be finite, then when the desired number of nanorobots has been constructed, there should be no unused quantities of any ingredient remaining.

The third requirement is that the environment be controlled so that the replication process can proceed efficiently and without malfunctions. Excessive turbulence, temperature extremes, intense radiation, or other adverse circumstances might prevent the proper functioning of the nanorobots and cause the process to falter or fail. Science-fiction writers have suggested that mutations might occur in a sophisticated self-replicating nanorobotic community, giving rise to the machine equivalent of natural selection. Such a process might be used to create a self-sustaining, evolving colony of robots on an extraterrestrial planet.
#404
Chat Box / Re: Quiz: Nano, nano!
Nov 08, 2008, 12:43 PM
ANSWER FOR 5

Atomic storage (sometimes called atomic memory) is a nanotechnology approach to computer data storage that works with bits and atoms on the individual level. Like other nanotechnologies, nano-storage deals with microscopic material. An atom is so small that there might be ten million billion in a single grain of sand; optimally, atomic storage would store a bit of data in a single atom. Current data storage methods use millions of atoms to store a bit of data. In 1959, the famous physicist Richard Feynman discussed the potential of atomic storage, explaining that every word ever written up to that point could be stored in a .10 millimeter-wide cubic space, if the words were written with atoms.

Franz Himpsel and colleagues at the University of Wisconsin-Madison created a device that uses 20 atoms to represent a bit of data on a silicone surface. The surface resembles that of a CD (compact disk) but the scale is nanometers rather than micrometers, yielding a storage density a million times higher. Himpsel and colleagues used a scanning tunneling microscope to remove single atoms, and suggest that an extra silicon atom might represent a 1, while a vacant spot represents a 0 (binary language is made up entirely of ones and zeroes). Although the researchers claim their prototype is "proof of (Feynman's) concept," they say that it may yet take decades of work to develop a practical working device that stores bits as single atoms.

IBM is working on a different approach to nano-storage in their Millipede project.
#405
Chat Box / Re: Quiz: Nano, nano!
Nov 08, 2008, 12:41 PM
ANSWER FOR 4

fullerene

A fullerene is a pure carbon molecule composed of at least 60 atom s of carbon. Because a fullerene takes a shape similar to a soccer ball or a geodesic dome, it is sometimes referred to as a buckyball after the inventor of the geodesic dome, Buckminster Fuller, for whom the fullerene is more formally named. Fullerenes are seen as promising components of future micro-electromechanical systems ( MEMS ) and in nanotechnology . Current work on the fullerene is largely theoretical and experimental.

NASA, in co-operation with geochemist Lynn Becker from the University of Hawaii, has discovered naturally-occuring fullerenes in ancient meteorites that hit the Earth. Recent research has suggested many uses for fullerenes, including medical applications, superconductors, and fiber-optics.
#406
Chat Box / Re: Quiz: Nano, nano!
Nov 08, 2008, 12:41 PM
ANSWER FOR 3

Digital-to-analog conversion is a process in which signals having a few (usually two) defined levels or states (digital) are converted into signals having a theoretically infinite number of states (analog). A common example is the processing, by a modem,of computer data into audio-frequency (AF) tones that can be transmitted over a twisted pair telephone line. The circuit that performs this function is a digital-to-analog converter (DAC).

Basically, digital-to-analog conversion is the opposite of analog-to-digital conversion. In most cases, if an analog-to-digital converter (ADC) is placed in a communications circuit after a DAC, the digital signal output is identical to the digital signal input. Also, in most instances when a DAC is placed after an ADC, the analog signal output is identical to the analog signal input.

Binary digital impulses, all by themselves, appear as long strings of ones and zeros, and have no apparent meaning to a human observer. But when a DAC is used to decode the binary digital signals, meaningful output appears. This might be a voice, a picture, a musical tune, or mechanical motion.

Both the DAC and the ADC are of significance in some applications of digital signal processing. The intelligibility or fidelity of an analog signal can often be improved by converting the analog input to digital form using an ADC, then clarifying the digital signal, and finally converting the "cleaned-up" digital impulses back to analog form using an DAC.
#407
Chat Box / Re: Quiz: Nano, nano!
Nov 08, 2008, 12:40 PM
ANSWER FOR 2

Grace Hopper nanosecond

In education, a Grace Hopper nanosecond is a prop used by a teacher to help students understand an abstract concept. The teaching tool got its name from the foot-long lengths of telephone wire that Admiral Grace Hopper used to give out at lectures. Admiral Hopper used the wires to illustrate how in one billionth of second (a nanosecond ) an electronic signal can travel almost twelve inches. In addition to being a gifted programmer, Admiral Hopper was quite famous during her lifetime for her teaching skills. Admiral Hopper believed that by providing the learner with a concrete analogy already in their frame of reference, it was possible to absorb and even understand an abstract concept that might otherwise be too difficult to comprehend. Towards the end of her life, when asked which of her many accomplishments she was most proud of, Admiral Hopper replied, "All the young people I have trained over the years".
#408
Chat Box / Re: Quiz: Nano, nano!
Nov 08, 2008, 12:38 PM
ANSWER FOR 1

nano

Nano is a prefix meaning "extremely small." When quantifiable, it translates to one-billionth, as in the nanosecond . Nano comes from the Greek word "nanos," meaning "dwarf."
#409
IF U JUST WANT CHOICES THEN CHECK BELOW

Answer Key: 1b; 2d; 3b; 4d; 5a; 6e; 7d; 8e; 9c; 10e

#410
ANSWER FOR 10

The GNU General Public License, often shortened to GNU GPL (or simply GPL), lists terms and conditions for copying, modifying and distributing free software. The GPL was created by Richard Stallman in order to protect GNU software from being made proprietary. It is a specific implementation of his "copyleft" concept. According to Stallman, copyleft is a derivative of copyright law that serves "the opposite of its usual purpose: instead of a means of privatizing software, it becomes a means of keeping software free." (The name was taken from the humorous slogan, "Copyleft -- all rights reversed.")

The first term of the GPL states that programmers may freely copy and distribute verbatim copies of a software program's source code, under the condition that each copy displays a copyright notice, disclaimer of warranty, intact GPL notices, and a copy of the GPL. The second term of the GPL, which deals with modification and redistribution of software, requires the same conditions as the first, along with notification of any changes made to the software.

The GPL itself is under the copyright ownership of the Free Software Foundation (FSF), a tax-exempt charity organization founded by Stallman
#411
CHECK ANSWER 4[SAME ANSWER FOR QUESTION 9 ALSO]
#412
ANSWER FOR 8

A multi-core processor is an integrated circuit (IC) to which two or more processors have been attached for enhanced performance, reduced power consumption, and more efficient simultaneous processing of multiple tasks (see parallel processing). A dual core set-up is somewhat comparable to having multiple, separate processors installed in the same computer, but because the two processors are actually plugged into the same socket, the connection between them is faster. Ideally, a dual core processor is nearly twice as powerful as a single core processor. In practice, performance gains are said to be about fifty percent: a dual core processor is likely to be about one-and-a-half times as powerful as a single core processor.

Multi-core processing is a growing industry trend as single core processors rapidly reach the physical limits of possible complexity and speed. Companies that have produced or are working on multi-core products include AMD, ARM, Broadcom, Intel, and VIA. Both AMD and Intel have announced that they will market dual core processors by 2005. At their 2004 Fall Developer Forum Intel predicted that, excepting their Celeron line, 40% of all processors the company ships will be multi-core by the end of 2006.
#413
ANSWER FOR 7

Server virtualization is the masking of server resources, including the number and identity of individual physical servers, processors, and operating systems, from server users. The server administrator uses a software application to divide one physical server into multiple isolated virtual environments. The virtual environments are sometimes called virtual private servers, but they are also known as partitions, guests, instances, containers or emulations.

There are three popular approaches to server virtualization: the virtual machine model, the paravirtual machine model, and virtualization at the operating system (OS) layer.

Virtual machines are based on the host/guest paradigm. Each guest runs on a virtual imitation of the hardware layer. This approach allows the guest operating system to run without modifications. It also allows the administrator to create guests that use different operating systems. The guest has no knowledge of the host's operating system because it is not aware that it's not running on real hardware. It does, however, require real computing resources from the host -- so it uses a hypervisor to coordinate instructions to the CPU. The hypervisor is called a virtual machine monitor (VMM). It validates all the guest-issued CPU instructions and manages any executed code that requires addition privileges. VMware and Microsoft Virtual Server both use the virtual machine model.

The paravirtual machine (PVM) model is also based on the host/guest paradigm -- and it uses a virtual machine monitor too. In the paravirtual machine model, however, The VMM actually modifies the guest operating system's code. This modification is called porting. Porting supports the VMM so it can utilize privileged systems calls sparingly. Like virtual machines, paravirtual machines are capable of running multiple operating systems. Xen and UML both use the paravirtual machine model.

Virtualization at the OS level works a little differently. It isn't based on the host/guest paradigm. In the OS level model, the host runs a single OS kernel as its core and exports operating system functionality to each of the guests. Guests must use the same operating system as the host, although different distributions of the same system are allowed. This distributed architecture eliminates system calls between layers, which reduces CPU usage overhead. It also requires that each partition remain strictly isolated from its neighbors so that a failure or security breach in one partition isn't able to affect any of the other partitions. In this model, common binaries and libraries on the same physical machine can be shared, allowing an OS level virtual server to host thousands of guests at the same time. Virtuozzo and Solaris Zones both use OS-level virtualization.

Server virtualization can be viewed as part of an overall virtualization trend in enterprise IT that includes storage virtualization, network virtualization, and workload management. This trend is one component in the development of autonomic computing, in which the server environment will be able to manage itself based on perceived activity. Server virtualization can be used to eliminate server sprawl, to make more efficient use of server resources, to improve server availability, to assist in disaster recovery, testing and development, and to centralize server administration.
#414
ANSWER FOR 6

Open Source Development Labs (OSDL) is a nonprofit corporation founded by IBM, Intel, and Computer Associates to support Linux developers and users. The goal of OSDL is to provide a place where Linux and other Open Source developers can work together and create standardized and compatible Linux platform applications. Plans for a state-of-the-art laboratory based somewhere in Oregon were announced in August 2000 by Scott McNeil, who is widely credited with the concept for OSDL.
#415
ANSWER FOR 5

K Desktop Environment (KDE) isan open source graphical desktop environment for Unix workstations. Initially called the Kool Desktop Environment, KDE is anongoing project with development taking place on the Internet and discussionsheld through the official KDE mailing list, numerous newsgroups, and Internet Relay Chat (IRC)channels. KDE has a complete graphical user interface (GUI) and includes a filemanager, a window manager, a help system, a configuration system, tools andutilities, and several applications. The most popular suite of KDE applicationsis KOffice, which includes a word processor, a spreadsheet application, apresentation application, a vector drawing application, and image editing tools.KOffice was released with KDE version 2.0 October 2000. On December 5, 2000, KDE2.0.1 was released.

Matthias Ettrich launched theKDE project in October 1996 with the goal of making the UNIX platform moreattractive and easy to use for computer users who are familiar with a graphicalinterface instead of typed commands. Today, KDE is used with Linux, Solaris,FreeBSD, OpenBSD, and LinuxPPC. Several hundred software programmers from all over the world contribute to the development of KDE.
#416
ANSWER FOR 4

LinuxWorld: Watching wikis, communities and GNOME vs. KDE

Although the penguin has definitely changed out of the tie-dyed tee shirt and into a three-piece suit, LinuxWorld still turns heads as the heartbeat of this vibrant community. And, the latest installment has proven to be no different.

Despite the presence of men in suits, this IT gathering focused on populist topics, and I'm going to talk about the hottest ones: the $100 laptop for every child; a fight between two free platforms; and wikis.

Write once?

Linux appeals to a large swath of technologists because it's all about choice. Yet, there are instances where one can argue that this flexibility has been a detriment to the community. One such instance is the emergence of two distinct desktop environments: GNOME and KDE.

While both GNOME and KDE have their merits, they are sufficiently different that developers are forced to choose which environment their applications will target. Of course, they could make the challenging decision to support two versions of their products. In the end, the community suffers because of the duplicated efforts required to create similar applications that target the different environments.

Open Source Development Labs (OSDL), a non-profit organization that promotes Linux adoption, hopes to eliminate this problem by creating a bridging facility that allows developers to write one application capable of running on both GNOME and KDE. OSDL's initiative, dubbed the Portland Project, will provide developers with a set of command-line tools and APIs that can be used to create custom services while ensuring a common interface for both environments.

A preview release is available now via the Portland Web site, with the final release due to arrive in June.

A laptop for everyone

I was fascinated by MIT Media Lab co-founder Nicholas Negroponte's keynote presentation on the One Laptop Per Child (OLPC) initiative. He first announced this effort at the Davos World Economic Forum a little over a year ago.

The $100 laptop (as the laptop has been dubbed, reflecting the initial target cost) is based on a slimmed-down version of Fedora Core, dubbed Skinny Linux, sporting a 500 Mhz AMD processor. It has the ability to form ad hoc local networks with other laptops located across remote villages in developing countries. Also, the $100 laptop will sport a human-powered generator capable of powering the laptop even in areas lacking traditional electricity resources.

According to Negroponte, seven countries are on the short list for receiving the first shipment of five to 10 million units scheduled for release in first quarter of 2007, They are Argentina, Brazil, China, Egypt and various parts of the Middle East, India, Nigeria and Thailand.

Wikis are hot

The love of wikis unites the suits and tie-dyed elements at LinuxWorld. Wikis are fast becoming a key corporate medium for facilitating internal team discussions, maintaining system documentation and encouraging community-driven product knowledge bases.

Seeking to capitalize on the growing interest in this arena, two wiki-focused companies are making prominent showings at the event.

Pushing wiki's merits in the role it plays in lessening the onslaught of corporate e-mail, Socialtext, an open source company, offers corporate teams the means to easily create and group-manage Web pages. Acknowledging that it does not need to disrupt the traditional penchant for using e-mail, Socialtext's Enterprise wiki product allows users to both send wiki pages via e-mail and create and update existing pages by way of sending an e-mail.

Seeking to help organizations better organize their increasingly scattered arrays of IT documentation, Splunk Inc. announced the launch of Splunk Base. Offering both a downloadable product and a service-based initiative, Splunk Base is intended to help users aggregate the knowledge of colleagues within the organization and even share information from other IT staff members from around the globe.

Both Socialtext and Splunk got a lot of attention from attendees, myself included.

I was surprised to see that attendance at this show was not up to the usual LinuxWorld standards. I, for one, have already confirmed my attendance at LinuxWorld San Francisco in August. I hope to see you there!

About the author: W. Jason Gilmore has developed countless Web applications over the past seven years and has dozens of articles to his credit on topics pertinent to Internet application development. He is the author of three books, including Beginning PHP 5 and MySQL 5: From Novice to Professional (Apress), now in its second edition, and with co-author Robert Treat, Beginning PHP and PostgreSQL 8: From Novice to Professional (Apress).
#417
ANSWER FOR 3

Skinny Linux is an umbrella term that encompasses any compact version of the Linux operating system, such as Austrumi, Puppy Linux Damn Small Linux and Feather Linux. Such lightweight implementations of the operating system require less space and power than the full-size OS. Skinny Linux is one of many cost-cutting measures that manufacturers are employing to produce the $100 laptop.
#418
ANSWER FOR 2

$100 laptop

XO is the first version of the $100 laptop expected to reach a substantial number of users. The $100 laptop is a product that several computer companies and thinkers have suggested over the years to help bridge the digital divide and bring information service to people in rural areas of developing countries. MIT's Media Lab founder Nicholas Negroponte, co-founder of the One Laptop per Child (OLPC) initiative, first proposed the $100 laptop as a way to encourage education and alleviate third world poverty.

The OLPC project plans to roll out approximately 2,500 laptops to eight countries in February 2007. The intention is to produce five million laptops by July 2007, scaling to 50 million by 2008. This version of the $100 laptop, called XO, will cost $150 but the expectation is that mass production will bring the cost down to $100 by 2008 and below that figure by 2010.
#419
ANSWER FOR 1

A wiki (sometimes spelled "Wiki") is a server program that allows users to collaborate in forming the content of a Web site. With a wiki, any user can edit the site content, including other users' contributions, using a regular Web browser. Basically, a wiki Web site operates on a principle of collaborative trust. The term comes from the word "wikiwiki," which means "fast" in the Hawaiian language.

A wiki allows a visitor to the "wikified" Web site to edit the content of the site from their own computer. Visitors can also create new content and change the organization of existing content. The simplest wiki programs allow editing of text and hyperlinks only. More advanced wikis make it possible to add or change images, tables, and certain interactive components such as games.

A wiki provides a simplified interface. At any time, contributors can conveniently view the Web page as it looks to other subscribers, before and after the changes they have made. It is not necessary to know HTML (hypertext markup language) or perform work in HTML code. The best known example of a wiki Web site is Wikipedia, an online dictionary building collaboration.
#420
Chat Box / "kid-friendly SEARCH ENGINE"
Nov 08, 2008, 11:06 AM
"EVERY PARENTS MUST READ"
The computer helper: Kid-friendly searching

Kids love the Internet. Unfortunately, as every parent knows, there's a lot of trouble they can get into while wandering through cyberspace. The challenge is to allow youngsters to learn from and enjoy the Internet while keeping them safe from harmful influences. That's the focus of this week's questions.

Q: My kids have their own accounts on my computer. I would like to set up their Web browsers so that a kid-friendly search engine appears automatically. Can you recommend some?

A: Yes, there are several search engines that are aimed specifically at kids. One of the most innovative new entrants is KidZui (http://www.kidzui.com), which is both a browser and learning environment that was created by parents for kids. You'll need to download the KidZui browser, sign up, and then click a link in an activation e-mail that you'll receive in order to get started. Once signed up, your child can begin using KidZui, and you'll likely be impressed immediately.

The KidZui interface is not only colourful and filled with Internet-based learning and entertainment opportunities, but it also simplifies the Web in virtually every way, from making the search field friendlier in appearance to presenting search results as a series of animated "snapshots" of the Web pages themselves. Sounds are integrated into the interface, too. When you click a search result, for instance, a fun sound introduces the page.

KidZui starts out full screen, and with its immersive and self- contained feeling, your child may never leave its confines, which is good because all content is deemed child safe. Your child can click on categories such as games, science, animals, sports, and "awesome stuff" to stay entertained and educated for hours. Best of all, as the parent who sets up KidZui for your child, you'll receive an e- mail message at the end of each KidZui session in which a report of your child's activities is recorded - including searches conducted and sites viewed.

You could also turn to kid-friendly versions of the most powerful search engines. The first is Ask for Kids (http://www.askkids.com), based on the Ask Jeeves search engine. With a friendly interface adorned by special category buttons for "school," "movies," "games," and "video," Ask Kids presents learning opportunities at every turn for youngsters who conduct searches here. Search for "hamster," for instance," and in addition to a list of search results, kids will see a dictionary definition of a hamster as well as additional relevant search categories, including "hamster care."

Yahoo! Kids (http://kids.yahoo.com) is another good option, although the page seems more static - updated less frequently with current goings-on - than the other sites. Yahoo! Kids is bright and colourful and contains top-of-the-age links to games, music, movies, jokes, sports, and more.

Google is conspicuously absent from the kid-safe search engine mix. Google's SafeSearch site (http://www.safesearchweb.com/index.html) purportedly filters out potentially harmful sites, but a test showed that the filtering results were less than impressive.

Q: How can I know if a Web contains content appropriate for my family before I visit it? We are using Windows.

A: You'll need to employ one or several content filtering options available to you.

There are controls in Internet Explorer that will help to block harmful or malicious sites. You should spend some time adjusting these controls to meet your preferences, since most of them are set to very low thresholds by default.

In Internet Explorer, open the Tool menus, and select Internet Options. From the resulting Internet Options dialog box, select the Content tab, and then click the Enable button in the Content Advisor section.

In the Content Advisor dialog box, you'll see a list of categories of sites that you can control. Categories include "content that creates fear, intimidation, etc.," "content that sets a bad example for young children," and "depiction of drug use." Scroll through the list of options, selecting each that you wish to enforce, and use the slider to determine the level of restriction. Then click the OK button. You'll be asked to supply a password so that no one can change the settings without your permission.

The content restrictions work surprisingly well. When someone tries to visit a restricted site, a dialog box pops up before the page is loaded, indicating to the user that the site contains restricted content and is blocked.

Firefox, the second most popular Web browser, has plenty of controls that help to prevent phishing and protect your privacy, but to get the kind of content protection you seek, you'd have to turn to add-ons.

The most secure type of filtering will come from a dedicated filtering software packages such as Net Nanny (http://www.netnanny.com) or Safe Eyes (http://www.internetsafety.com), both available for PC and Mac. These solutions are more elegant - and effective - for Windows XP users because they work regardless of which Web browser you use - and they can control content seen not only over the Web but within instant messengers and e-mail.

Q: What can I do to keep my child safe on the Web?


A: First, take the steps discussed above - Set up a kid-friendly home page and employ good filtering software. If you're using Windows Vista, you have filtering software built in to the operating system. Look in the Vista Control Panel, set up a user account for your child, and then apply the content filter to that new user account.

In addition, you should talk to your child about what constitutes safe behaviour. Tell your child never to give out an e-mail address or personal information to people they don't know and not to open e- mail messages or attachments from unknown sources, either. Your child should also be told always to consult you if he or she visits a Web site or receives some form of communication over the Internet that makes him or her feel uncomfortable.

As a parent, you can go a long way toward ensuring safety by limiting your child's time online - and monitoring, when possible, the online activities he or she engages in.


"EVERY PARENTS MUST READ"
#421
Hot News - InFocus / Re: latest science news
Nov 08, 2008, 10:57 AM
"WE Are BACK..."

Social Interactions Can Alter Gene Expression In Brain, And Vice Versa

Our DNA determines a lot about who we are and how we play with others, but recent studies of social animals (birds and bees, among others) show that the interaction between genes and behavior is more of a two-way street than most of us realize.

This is not a new idea to neuroscience, but one that is gaining strength, said University of Illinois entomology and neuroscience professor Gene Robinson, lead author of a review on the subject this week in the journal Science. Stanford University biology professor Russell Fernald and Illinois cell and developmental biology and neuroscience professor David Clayton are co-authors.

Genes in the brain are malleable, turning on or off in response to internal and external cues. While genetic variation influences brain function and social behavior, the authors write, social information also alters gene expression in the brain to influence behavior.

Thanks to the newly sequenced genomes of several social animals, including honey bees and zebra finches, and new technologies such as microarrays (which allow researchers to glimpse the activity of thousands of genes at a time) neuroscientists are gradually coming to understand that "there is a dynamic relationship between genes and behavior," Robinson said. "Behavior is not etched in the DNA."

A critical insight came in 1992, in a study of songbirds led by David Clayton. He and his colleagues found that expression of a specific gene increases in the forebrain of a zebra finch or canary just after it hears a new song from a male of the same species. This gene, egr1, codes for a protein that itself regulates the expression of other genes.

The finding was not unprecedented; previous studies had shown that genes switch on and off when an animal is trained to perform a task in the laboratory, Robinson said.

But when Clayton's team found this change in gene expression in response to a social signal – a song from a potential competitor, something the bird would likely hear in nature – it drew attention to how powerfully social interactions can alter gene expression in the brain.

"What's more significant to a bird than hearing another bird singing?" Clayton said. "This is going on in the equivalent of our auditory cortex and association cortex, so this is pretty high-level stuff going on in the brain. And this was happening in more or less real time by very naturalistic stimuli."

Reading Clayton's 1992 paper "was a eureka moment for me," Robinson said.

"This just brought it out into the social world, saying that this occurred in animals that have to make a living in the real world and pay attention to a lot of nuanced stimuli," he said. "So I think that was really a very important step in our understanding."

In his own work, Robinson has used microarrays to study this phenomenon on a larger scale and has found that literally thousands of genes turn on or off in the honey bee brain in response to social stimuli. One such gene, called for (for foraging), was originally discovered in fruit flies by Marla Sokolowski at the University of Toronto. Flies that carry different versions of for show different types of foraging behavior. Each version gives its bearer a behavioral advantage in certain environmental conditions.

Robinson knew that honey bee workers start out working in the hive as nurses and only later graduate to the role of foragers. Perhaps, he reasoned, even though the differences in for are etched in the DNA in flies, this same gene in the bee might be more dynamic and help influence the transition from hive work to foraging.

In a study published in 2002, Robinson and his colleagues reported that expression of for did in fact increase in the brains of honey bees as they developed into foragers, and manipulating its expression caused bees to forage precociously.

The researchers also found that social factors, in the form of chemical signals called pheromones, induced this "upregulation" of for. Foragers produce a pheromone that signals to the younger bees that there are enough foragers. If the foragers are removed from the hive, some young bees develop into foragers much earlier in life than usual.

Sokolowski's work indicated that for had changed over evolutionary time, producing two varieties of fruit flies that differed in their behavior. Robinson had found that social information altered expression of the same gene over a much shorter timescale – within the lifespan of a honey bee – also changing its behavior.

"An appreciation of the idea that differences in gene expression can occur over vastly different time scales helps understand some of the complex relationships between genes, brain and behavior," Robinson said.

The picture that is emerging from these and other studies suggests that social signals can have a profound effect on when and how genes function.

An organism's genes, its environment, the social information it receives, "all these things interact," said Clayton. "Experience is constantly coming back in to the level of the DNA and twiddling the dials and the knobs."
#422
Non Engineer's Discussion !!! / "ANIMATIONS"
Nov 08, 2008, 10:52 AM
Animation industry to grow at 27% CAGR: NASSCOM

Indian Animation industry would see growth at the rate of 27% CAGR in the coming years. The animation industry can cross $1163 million mark by 2012. It is forecasted in a report titled 'NASSCOM Animation and Gaming India 2008' by the industry body NASSCOM. It is specially included with a session on 'Super Pitch' to show its commitment for further development of Indian animation industry.

Animation industry includes entertainment, education, custom content development and multimedia/web design. Education sector would record highest growth rate at about 40 per cent per annum. Gaming industry is expected to value at $1,060 million by 2012 at a CAGR of 50 per cent. It currently stands at Rs 996.4 crore.

NASSCOM president, Som Mittal said that India would soon become hub of animation and gaming industry. It has already surpassed its counterparts by delivering projects of international standards. The country maintains highly skilled staff, growing maturity of animation studios, number of co-production ventures, intellectual property, growing consumer demand and cost attractiveness.
#423
Gift / Prizes Request / topup request
Nov 07, 2008, 08:56 PM
User Name : manimarank
Date  : 7 nov 08
Status : Urgent
Postcount : 39
Information : airtel prepaid inside TN
Total No of Post you made so far : Ex 674 posts : 525
Type of the Gift : Mobile Topup
Select Your Service Provider : Airtel Prepaid

Here by i declare that , before sending this request. I have verified my todays post. So Please check the topup status and confirm it.
[blink]Note : You will be given Warning if you are trying to test this Form or Found Fake[/blink]
#424
Chat Box / what is DB?
Nov 07, 2008, 08:45 PM
In electronics and communications, the decibel (abbreviated as dB, and also as db and DB) is a logarithmic expression of the ratio between two signal power, voltage, or current levels. In acoustics, the decibel is used as an absolute indicator of sound power per unit area. A decibel is one-tenth of a Bel, a seldom-used unit named for Alexander Graham Bell, inventor of the telephone.

Suppose a signal has a power of P1 watts, and a second signal has a power of P2 watts. Then the power amplitude difference in decibels, symbolized SdBP, is:

SdBP = 10 log10 (P2 / P1)

Decibels can be calculated in terms of the effective voltage if the load impedance remains constant. Suppose a signal has an rms (root-mean-square) voltage of V1 across a load, and a second signal has an rms voltage of V2 across another load having the same impedance. Then the voltage amplitude difference in decibels, symbolized SdBV, is:

SdBV = 20 log10 (V2 / V1)

Decibels can also be calculated in terms of the effective current (amperage) if the impedance remains constant. Suppose a signal delivers an rms (root-mean-square) amperage of A1 through a load, and a second signal delivers an rms amperage of A2 through another load having the same impedance. Then the current amplitude difference in decibels, symbolized SdBA, is:

SdBA = 20 log10 (A2 / A1)

When a decibel figure is positive, then the second signal is stronger than the first signal. When a decibel figure is negative, then the second signal is weaker than the first signal. In amplifiers, the gain, also called the amplification factor, is often expressed in decibels. A circuit amplifies only if the decibel figure for the output-to-input power ratio (SdBP) is positive.

In sound, decibels are defined in terms of power per unit surface area on a scale from the threshold of human hearing, 0 dB, upward towards the threshold of pain, about 120-140 dB. As examples: the sound level in the average residential home is about 40 dB, average conversation is about 60 dB, typical home music listening levels are about 85 dB, a loud rock band about 110 dB, and a jet engine close up is 150dB.

Decibel units are commonly used in audio equalizers, both the hardware kind and the software kind, as a convenient reference point while editing. Boosting an equalizer band whose center point is 1000 by 3 dB means that you have raised the volume level of that frequency band by 3 dB as it relates to the other frequencies in the sound. A typical equalizer has a range for boosting or diminishing a sound level of +/-18 dB.
#425
Unix (often spelled "UNIX," especially as an official trademark) is an operating system that originated at Bell Labs in 1969 as an interactive time-sharing system. Ken Thompson and Dennis Ritchie are considered the inventors of Unix. The name (pronounced YEW-nihks) was a pun based on an earlier system, Multics. In 1974, Unix became the first operating system written in the C language. Unix has evolved as a kind of large freeware product, with many extensions and new ideas provided in a variety of versions of Unix by different companies, universities, and individuals.

Partly because it was not a proprietary operating system owned by any one of the leading computer companies and partly because it is written in a standard language and embraced many popular ideas, Unix became the first open or standard operating system that could be improved or enhanced by anyone. A composite of the C language and shell (user command) interfaces from different versions of Unix were standardized under the auspices of the IEEE as the Portable Operating System Interface (POSIX). In turn, the POSIX interfaces were specified in the X/Open Programming Guide 4.2. These interfaces are also known as the "Single UNIX Specification" and, in the most recent version, "UNIX 03"). The trademarked "UNIX" is now owned by the The Open Group, an industry standards organization, which certifies and brands Unix implementations.

Unix operating systems are used in widely-sold workstation products from Sun Microsystems, Silicon Graphics, IBM, and a number of other companies. The Unix environment and the client/server program model were important elements in the development of the Internet and the reshaping of computing as centered in networks rather than in individual computers. Linux, a Unix derivative available in both "free software" and commercial versions, is increasing in popularity as an alternative to proprietary operating systems.
#426
Buckypaper is a strong and lightweight substance manufactured from compressed carbon nanotubes
#427
every IT's want to know...

YESZZ,nothing but

Y2K
what is Y2K?

Y2K is an abbreviation for "year 2000." As that year approached, many feared that computer programs storing year values as two-digit figures (such as 99) would cause problems. Many programs written years ago (when storage limitations encouraged such information economies) are still being used. The problem was that when the two-digit space allocated for "99" rolled over to 2000, the next number was "00." Frequently, program logic assumes that the year number gets larger, not smaller - so "00" was anticipated to wreak havoc in a program that hadn't been modified to account for the millennium. This situation was sometimes referred to as "the Y2K problem" or "the millenium bug."

So pervasive was the problem in the world's legacy application payroll, billing, and other programs that a new industry sprang up dedicated to helping companies solve the problem. IBM and other major computer manufacturers, software houses, and consultants offered tools and services to address this problem.

Given the automation of modern life, some feared widespread and severe disruption to critical services as the year 1999 ticked over to the year 2000. However, very few serious problems were reported.
#428
Chat Box / what is ZERO ADMINISTRATION?
Nov 07, 2008, 06:23 PM
Zero Administration for Windows is Microsoft's initiative to help make its operating system easier to install and manage. The goal is to reduce the ownership costs of PCs, particularly in large corporations with many thousands of desktop computers to support.

Microsoft introduced Zero Administration in November 1996, at a time when Oracle and Sun were touting their own approach of "network computers" as a new way of doing corporate applications with less overhead than traditional PCs. Microsoft responded with its concept of Zero Administration. The idea was to include in all of Microsoft's Windows operating systems features that would simplify the time it took to install and maintain the system on thousands of machines -- and at the same time reduce the costs of keeping PCs in corporate America.

Microsoft provides Zero Administration packs for Windows NT and Windows 98. These packs include features to automatically send out operating-system and application software updates throughout the company from one workstation, and having these updates roll back to the previous version if something goes wrong during the process.

For Windows 2000, Zero Administration's Group Policy feature lets administrators set rights and permissions for network and application access on the group level instead of having to do it for each individual user. If everyone in the legal department needs the same permissions and rights to applications, administrators need set this up only once for all the employees in the department.
#429
Chat Box / what is ZERO-DAY EXPLOIT?
Nov 07, 2008, 06:19 PM
ZERO-DAY

A zero-day exploit is one that takes advantage of a security vulnerability on the same day that the vulnerability becomes generally known. Ordinarily, after someone detects that a software program contains a potential exposure to exploitation by a hacker, that person or company can notify the software company and sometimes the world at large so that action can be taken to repair the exposure or defend against its exploitation. Given time, the software company can repair and distribute a fix to users. Even if potential hackers also learn of the vulnerability, it may take them some time to exploit it; meanwhile, the fix can hopefully become available first.

With experience, however, hackers are becoming faster at exploiting a vulnerability and sometimes a hacker may be the first to discover the vulnerability. In these situations, the vulnerability and the exploit may become apparent on the same day. Since the vulnerability isn't known in advance, there is no way to guard against the exploit before it happens. Companies exposed to such exploits can, however, institute procedures for early detection of an exploit.

A study released by Symantec in early 2004 found that although the number of vulnerabilities discovered was about the same in 2003 as in 2002, the time between the vulnerability and exploits based on it had narrowed. According to the infoAnarchy wiki, "14-day" groups and "7-day" groups carry out an exploit within 14 or 7 days of a product's market release. Conducting a zero-day exploit establishes crackers as members of the elite, because they must have covert industry connections to gain the inside information needed to carry out the attack.
#430
Chat Box / what is ZERO?
Nov 07, 2008, 06:12 PM
what would u say,if a query is raised to u like WHAT IS ZERO?

DONT SAY LIKE NULL ,NOTHING OR -1 TO +1 VALUE,NO VALUE....ETC.ITS CORRECT BUT TO KNOW MORE OR SAY MORE, READ BELOW.


"zero"

In mathematics, zero, symbolized by the numeric character 0, is both:

1. In a positional number system, a place indicator meaning "no units of this multiple." For example, in the decimal number 1,041, there is one unit in the thousands position, no units in the hundreds position, four units in the tens position, and one unit in the 1-9 position.

2. An independent value midway between +1 and -1.

In writing outside of mathematics, depending on the context, various denotative or connotative meanings for zero include "total failure," "absence," "nil," and "absolutely nothing." ("Nothing" is an even more abstract concept than "zero" and their meanings sometimes intersect.)

Notation for placeholders in positional numbers is found on stone tablets from ancient (3,000 B.C.) Sumeria. Yet, the Greeks had no concept of a number like zero. In terms of modern use, zero is sometimes traced to the Indian mathematician Aryabhata who, about 520 A.D., devised a positional decimal number system that contained a word, "kha," for the idea of a placeholder. By 876, based on an existing tablet inscription with that date, the kha had become the symbol "0". Meanwhile, somewhat after Aryabhata, another Indian, Brahmagupta, developed the concept of the zero as an actual independent number, not just a place-holder, and wrote rules for adding and subtracting zero from other numbers. The Indian writings were passed on to al-Khwarizmi (from whose name we derive the term algorithm ) and thence to Leonardo Fibonacci and others who continued to develop the concept and the number.

Various arithmetic operations that include zero have sometimes been the subject of dispute such as the result of dividing zero by zero. The answer is that it can't be done. Although early mathematicians tried to wrestle some sort of result out of this operation, later ones have decided that this problem just won't bear any fruit. This is viewed as another case where language allows us to ask a question that really doesn't make sense to ask.
#431
Chat Box / Re: 7 Qualities of a Good Leader
Nov 07, 2008, 05:49 PM
hi sajiv,

i read ur post.nice one.

keep posting cute posts like this one everyday...

thanks keep posting
#432
Chat Box / Quiz -- Software development
Nov 07, 2008, 02:53 PM
How to take the quiz: - After reading the question, click on the answer that you think is correct to go to the whatis.com definition. If the answer you've chosen is correct, you will see the question text or an approximation of it somewhere in the definition.
OR
- After reading the question, note your answer choice. Check your answers by using the answer key at the end of the quiz.

1. This is a pragmatic approach to program development that emphasizes business results first, and takes an incremental, get-something-started approach to building the product, using continual testing and revision.
a. Practical Extraction and Reporting Language
b. Extreme Programming
c. affective computing
d. Rational Unified Process

2. This is a traditional measure of how large a computer program is or how long or how many people it will take to write it, sometimes used as a rough measure of programmer productivity.
a. KLOC
b. telemetrics
c. time-to-live
d. cipher

3. This programming model takes the view that what we really care about is the data structure we want to manipulate rather than the logic required to manipulate them.
a. data modeling
b. field-programmable gate array
c. Curl
d. object-oriented programming

4. This is a set of programs used by a computer programmer to write application programs.
a. software developer's kit
b. WYSIWYG
c. groupware
d. text editor

5. This a characteristic attributed to a computer program if it can be used in an operating systems other than the one in which it was created without requiring major rework.
a. open source
b. dumb
c. portable
d. SMART

6. This is a specific method prescribed by a computer operating system or by an application program by which a programmer writing an application program can make requests of the operating system or another application.
a. application programming interface
b. interrupt request
c. use case
d. XML Query Language

7. This is a horizontal bar chart frequently used in project management that provides a graphical illustration of a schedule that helps to plan, coordinate, and track specific tasks in a project.
a. Gantt chart
b. MIP map
c. pictograph
d. task bar

8. This is a programming environment that has been packaged as an application program, typically consisting of a code editor, a compiler, a debugger, and a GUI builder.
a. WYSIWYG
b. IDE
c. sandbox
d. bricks and mortar

9. This is a formal document used to describe in detail for software developers a product's intended capabilities, appearance, and interactions with users.
a. acceptable use policy
b. license
c. Bootstrap Protocol
d. functional specification

10. This is an approach to programming that allows global properties of a program to determine how it is compiled into an executable program.
a. Universal Data Access
b. self-assembly
c. aspect-oriented programming
d. Practical Extraction and Reporting Language
#433
Chat Box / Quiz: Writing for business
Nov 07, 2008, 02:51 PM
Is your prose as good as your code?

1. Which one is correct?
a. The government approved a program that will give iPods to disadvantaged children.
b. The government approved a program which will give iPods to disadvantaged children.

2. Which one is correct?
a. Bacon and eggs are Bill Gates' favorite breakfast.
b. Bacon and eggs is Bill Gates' favorite breakfast.

3. Which one is correct?
The spyware infestation had a startling ________ on network performance.
a. affect
b. effect

4. Which one is correct?
Poor network performance ___________ everyone's work.
a. affected
b. effected

5. Which one is correct?
a. The next topic he addressed was the many instances of identity theft.
b. The next topic he addressed were the many instances of identity theft.

6. Which one is correct?
a. The recent divestiture, combined with rising costs, are expected to affect profits.
b. The recent divestiture, combined with rising costs, is expected to affect profits.

7. Which one is correct?
a. While answering the e-mail, the phone rang and interrupted me.
b. While answering the e-mail, I was interrupted by the phone ringing.

8. Which one is correct?
a. Unlike spam or spyware, spim is not under investigation by the federal government.
b. Unlike spam or spyware, the federal government is not investigating spim.

9. Which sentence is preferable?
a. "I'm not going to stand for it," Carly said.
b. "I'm not going to stand for it," fumed Carly.

10. Which sentence is preferable?
a. This issue was decided by the committee.
b. The committee decided this issue.
#434
It's a mess. Victims everywhere you look. People slumped at their computers, networks unraveling, browsers hijacked, disappearing e-mail. Your job: Analyze the scene, solve the crime.

1. Does that strange blue glow from one computer screen mean anything? But first we have to figure out what to call it.
[Clue: The computer is not a Mac.]

2. Probably just a blue herring. Let's look at one of the bodies and it's not going to be pretty. What will we call the thoughts of the network administrator that have been strewn all over the carpet?
[Clue: You do one of these when you need to pass on everything you know about something.]

3. Aha! This programmer's body is riddled with spaghetti code. Could it be that he was assaulted by a . . . ?
[Clue: They don't make programs more popular than this kind. This kind will really slay you.]

4. And suppose the program got fed up with this programmer and turned the tables on him? Hmmm. That could mean that this programmer was doing some . . . ?
[Clue: If you're trying to fix a program, you may want to try several approaches at once to see if one of them works.]

5. But wait! There! On the carpet as big as anything! Probably about size 12-D, we'd say.
[Clue: Robinson Crusoe found one of these that Friday had left behind. The one he found had toes, though.]

6. Possibly it's time for scientific tools. Let's recreate everything with drawings and move them around using . . . (darn it, we forget what we call this; can you help?)
[Clue: Two words, we remember that. The first word means "science used in law" and the second means "the process of making things look alive." I mean how helpful can we get? We just can't remember it ourself or is it ourselves?]

7. One of the computers in this room is still alive, it looks like. In fact, it looks suspiciously like Suspect #1 because it happens to be a . . . ?
[Clue: These servers are relatively thin and a bit cutting-edge. The answer is not Ockham's razor, by the way.]

8. However, as we all know, it's never going to be Suspect #1. And besides we just noticed a page of the calendar has been torn off the wall and Victim #3 is holding it clutched in her hand. On the page someone has scrawled with photonic ink the words "Black Tuesday." Which someone on our crime scene investigation team just happens to recall is known as . . . ?
[Clue: It's the day in the month that Microsoft comes out with all its "fixes."]

9. Cancel the investigation. Someone just came in and said that they did it. They didn't give us their last name but we know what it is. Their first name was "Jack" and middle initial "T." We doubt that you'll be able to figure out his last name.
[Clue: This program is used to burn music files to a CD.)]

10. Although we did get lucky this time, we nevertheless believe in using all the tools at our command, including that of our crime-fighting brains. Time and again, we learned it's the only way to come up with an . . . ?
[Clue: Hercules Poirot often comes up with this kind of solution. That's why we always dress up on the job.]
#435
Chat Box / Quiz: The robots are coming!
Nov 07, 2008, 02:49 PM
Sure -- NOW they vacuum and scrub the floor -- but what happens when they wise up? The following could be required information when the robots take over. How much do you know about our artificially intelligent friends?

1. The word "robot" was coined in 1920. Is the term:
a. an abbreviation of "row" and "boat," for an early version that did just that?
b. derived from a Czech word meaning "forced labor?"
c. named for the creator of the first robot, Robert Botsworth?

2. One of the earliest known working robots was da Vinci's self-propelled car, circa 1478. Was it run by steam pressure or springs?
Answer

3. What's the term for a robot that is designed to resemble a human?

4. Which of the following is NOT one of Issac Asimov's Three Laws of Robotics:
a. Robots must not meet in secret.
b. Robots must never harm human beings.
c. Robots must protect themselves without violating the other rules.
Answer

5. If the shape-shifting chembot is developed, it could travel over considerable distances carrying an embedded payload, change shape and size as required, and then reconstitute to its original form. What organization recently put out an RFP for its design?

6. Used with satellites, space probes, and mobile robots, this term describes is the wireless transmission and reception of measured quantities for the purpose of remotely monitoring environmental conditions or equipment parameters. What is it?

7. Which sense does the field of haptics replicate for the user?
a. vision
b. hearing
c. taste
d. touch
c. smell

8. Based on a Greek word meaning "steersman" or "governor," this is the science or study of control or regulation mechanisms in human and machine systems. What is it?

9. DARPA's early cyborg insect experiment using wasps was ill-fated. Why?

10. If self-replicating robots ever take over, the resulting situation is sometimes referred to as a gray goo scenario. In this context, what are self-replicating humans sometimes called?
#436
Chat Box / Quiz: Talkin' tech turkey
Nov 07, 2008, 02:47 PM
What are we thankful for? In a word -- you, our readers! We'd like to take this opportunity to say thank you for contributing to Whatis.com and helping us to keep the site growing and useful. Please join us for our traditional Thanksgiving quiz-feast of tasty IT terms.

1. This is a derogatory term for someone who tends to spend a great deal of leisure time in front of the computer, perhaps coming to resemble a beloved tuber of the holiday table. (Hint: It sounds like a very bad idea for a genetically modified food.)
What is it?

2. In a spreadsheet or a database, this is a data structure used to organize information. (Hint: Its Thanksgiving namesake might feature a cornucopia centerpiece.)
What is it?

3. This is a numerical constant that represents the ratio of a circle's circumference to its diameter on a flat plane surface. (Hint: Would you prefer pumpkin or pecan?)
What is it?

4. This is an object-oriented programming interface from Sun Microsystems that lets you build components that can be deployed in a network on any major operating system platform. (Hint: Grind 'em up!)
What is it?

5. On a Web site this is a navigation tool that allows a user to see where the current page is in relation to the Web site's hierarchy. (Hint: An overstuffed turkey might leave this on the floor on the way to the stove.)
What is it?

6. This Unix command execution program developed at Bell Labs is a comprehensive combined version of other major UNIX shells. (Hint: It sounds like something discarded after husking maize for the Thanksgiving dinner)
What is it?

7. This is a false, or phantom, signal that appears in a wireless receiver. (Hint: It sounds like a word you might call to try and catch your Thanksgiving turkey.)
What is it?

8. In communications, this is the addition of a small number of binary digits to a transmission unit in order to fill it up to a standard size. (Hint: It sounds like a savory turkey side-dish made with -- computer data.)
What is it?

9. In wireless communications, this is a line that connects the antenna to the receiver. (Hint: You might use this term to describe the queue for the buffet.)
What is it?

10. This is a computer system, especially in the entertainment industry, that combines disparate hardware and software-controlled lighting, sound, and visual effects into a single, synchronized system. (Hint: If you do this, you might not have to loosen your belt buckle after dinner.)
What is it?
#437
Chat Box / Quiz: SQL Server 2000
Nov 07, 2008, 02:45 PM
DIRECTIONS: Match the SQL Server statement in the right-hand column with its description in the left-hand column.

How to take the quiz:
After reading the question, write down the letter of your answer choice. Check your answers by using the answer key at the end of the quiz.

1._____ This allows you to read ten rows from a table.

2. _____This is used to show the text for a given stored procedure.

3._____ This is used to ensure a null field is returned as zero.

4._____ This is used to show all object names in the current database matching a pattern.

5. _____This is used to show the table definition.

6. _____This is used to show all DTS packages that match a pattern.

7._____ This is used to show all constraints for table names in the current database matching a pattern.

8._____ This is used to run UPDATE STATISTICS against all user-defined tables in the current database.

9._____ This is used to show all stored procedures in the current database that match a pattern.

10._____ This is used to ensure an empty string is returned as null.

a) EXEC UPDATE STATISTICS

b) EXECUTE sp_help TABLE_NAME

c) select * from all_CONS_COLUMNS where table_name like '%PATTERN%'

d) EXECUTE sp_helptext PROCEDURE_NAME

e) select distinct name from msdb.dbo.sysdtspackages where name LIKE '%PATTERN%'

f) select * from TABLE_NAME where rowcount <= 10

g) select * from INFORMATION_SCHEMA.CONSTRAINT_TABLE_USAGE where TABLE_NAME LIKE '%PATTERN%'

h) select ISNULL(FIELD_NAME, 0) from TABLE_NAME

i) select TOP 10 * from TABLE_NAME

j) select distinct name from msdb.dbo.sysobjects where name LIKE '%PATTERN%'

k) EXECUTE sp_helptext TABLE_NAME

l) select * from sysobjects where name LIKE '%PATTERN%'

m) select NULLIF(FIELD_NAME, '') from TABLE_NAME

n) EXEC sp_updatestats

o) select * from sysobjects where xtype = 'P' and name LIKE '%PATTERN%'

p) select * from sysobjects where uid = 1 and name LIKE '%PATTERN%'
#438
Chat Box / Quiz: Nano, nano!
Nov 07, 2008, 02:43 PM
Good things come in small packages -- really, really small packages. Somewhat paradoxically, nanotech is getting bigger all the time. How much do you know about the finer details? (We bet you know -- or can guess -- more than you'd think!)

1. Nano is a prefix meaning "extremely small." When quantifiable, it translates to one-billionth. Nano comes from a Greek word meaning:
a. flea
b. dwarf
c. grandmother

2. Admiral Grace Hopper famously used segments of wire to illustrate how far an electrical signal could travel in a nanosecond. How long were the pieces of wire?

3. Paul Saffo of the Institute for the Future in Palo Alto, California, believes nanotech-based analog computing will be "the foundational technology of the next decade." We know that digital data has two possible states. In theory, how many states can analog data have?

4. Because of its soccer ball-like shape, the fullerene is named for Buckminster Fuller (It's also sometimes called a "buckytube."). What structure is Fuller most famous for inventing?
a. the geodesic dome
b. the wind tunnel
c. the virtual reality CAVE

5. Optimally, atomic storage would store a bit of data in a single atom. How many atoms might a single grain of sand hold?
a. ten million
b. ten billion
c. ten million billion

6. In nanotechnology, this is a process in which devices whose diameters are of atomic scale, on the order of nanometers, create copies of themselves. What is it?

7. In Michael Crichton's novel Prey , the scenario in Question 6 goes horribly awry. What is the term for that catastrophic, nanorobot-created situation?

8. Molecular manufacturing deals with the design and manufacture of electronic circuits and mechanical devices built at the molecular level of matter. What is molecular manufacturing better known as?

9. A qubit is a particle so small that the addition or removal of a single electron changes its properties in some useful way. What is qubit short for?

10. Spintronics is an emerging field of nanoscale electronics involving the detection and manipulation of the spin of this subatomic particle. What is it?
#439
Last year was a big year for penguins, from their appearance in Oscar-winning documentaries to wholesale adoption of Linux by South America's largest economy. What does 2006 hold in store?

TechTarget's experts went in search of the hottest news and trends at this year's Linuxworld with high hopes of learning where the penguin might be marching next.
(Hint: It wasn't to go fishing off the coast of Antarctica!)

Want to read up on the conference before taking the quiz? Read this article first.

How to take the quiz:
- After reading the question, click on the answer to go to the whatis.com definition o