Showing posts with label comptia. Show all posts
Showing posts with label comptia. Show all posts

Tuesday, March 13, 2012

SG1-001 Q&A / Study Guide / Testing Engine

Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com


QUESTION 1
Which two (2) are advantages of ISL over-subscription? (Choose two.)

A. efficient ISL bandwidth utilization
B. lowers cost-per-port per installation
C. higher performance per ISL
D. enables zoning simplicity
E. more available F_Ports

Answer: A,E

Explanation:


QUESTION 2
The SAN audit reports that there is a single fabric in a full mesh topology. Which three (3) benefits
result from migrating to dual fabrics with full mesh topologies? (Choose three.)

A. less inter-switch links
B. simplifies manageability
C. protection from human error
D. reduction in maintenance activity
E. decreased maintenance disruption

Answer: A,C,E

Explanation:


QUESTION 3
What two (2) benefits does SCSI Command Tag Queueing provide? (Choose two.)

A. allows I/O requests to be queued to the device
B. determines the most efficient way to order & process commands
C. tags I/O requests so they can be executed first in first out
D. allows SCSI I/O throughput to equal rates of fibre channel
E. determines queue depth position

Answer: A,B

Explanation:


QUESTION 4
You have a single fabric with four servers connecting to an edge switch in a core edge
configuration with single 2Gb/s ISLs to the core. Each server has an average throughput
requirement of 40MB/s. Under which circumstance would you need to add a second ISL?

A. to provide a redundant path
B. to avoid congestion on the ISL
C. to separate out FSPF updates
D. to provide a management path

Answer: A

Explanation:


QUESTION 5
Two servers have been connected to a SAN with redundant fabrics and the zone configuration
needs to be changed. How can you safely change the zone configuration?

A. Save the current zone configuration to disk, modify it and apply it to both fabrics simultaneously to avoid segmentation.
B. Modify the zone configuration on one fabric, test it, and then modify the zone configuration on the second fabric.
C. Modify the zone configuration on one fabric, test it, and then copy the zone configuration to the second fabric.
D. Modify the zone configuration on both fabrics at the same time, enable them simultaneously to avoid segmentation.

Answer: B

Explanation:


Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com

Thursday, February 23, 2012

Using VXML Tools to Design Software

Most people think that interactive dialogue between human and computer is impossible, but by using voice recognition and VXML applications, this becomes possible, and the results are amazing. VoiceXML applications are used extensively in numerous call centres throughout the world, and specific VXML tools are used to personalise each application to suit the need of each client. The automated phone systems that use this have numerous roles, including, but not limited to, package information, order information, notifications and alarms. IVR technology is used alongside it, to provide interactive voice responses to the requests of users.
It may sound extremely complicated, but it is not, and using such systems properly can truly save a lot of time and manpower. To cater to the needs of different customers, different companies have developed their own software and VXML tools. Most offer graphical interfaces that make them extremely easy to use, and most also offer top level maintenance to go along.

MCTS Certification, MCITP Certification

Microsoft Commptia A+ Training , Comptia A+ Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


However, some companies go even further, and they offer the tools needed for each company to develop their very own VXML tools and applications. The good part is that no programming skills are required for this, as these also have a graphical interface and use a simple drag and drop method. Companies can use this to create applications tailored to their specific needs, without needing to hire a programmer.
It is well known that developing any application takes considerable financial effort, not to mention the extended period of time that developing a good application requires. By having a graphical interface and clear instructions on how to use the software, companies can save a lot of resources and can have their application ready much faster than expected.
Some may think that applications developed using this will lack the capabilities of professional applications, and that they are nothing more than cheap versions of the professional ones, but that is wrong. In fact, some of the applications created using such tools, and the backend capabilities added to them, are much better than many professional applications that cost several times more. This also includes applications that could be created by professional programmers not using the tools provided, as besides the time needed for development, testing, and tweaking, there is also the matter of price, and that is much higher that what it would cost to purchase the tools needed to create the software.

More than one application is usually used in large companies, and managing them is not a problem, because there is usually a management console available that can be used to monitor all the applications that are running in the system. This allows managers to keep an eye out on what is happening and what their workers are doing, from their own workstations, without having to move around and check up on everyone.
Time is saved this way as well, and it is easy to see why such solutions are increasing in popularity. Managers are free to handle other issues and problems, as they no longer have to worry about keeping an eye on their workers. They have a complete data log that can be checked at all times to see what was going on, and they are notified immediately of any problems that arise in the system.
Workers also gain several benefits from using such applications, as they make their job easier. The applications created using the VXML tools can handle calls from users and provide the required information without any management. Using IVR technology, user responses are analysed and the software determines what the best course of action is. In case there are any errors in detecting what the user is saying, the software can alert a live consultant who can jump into the call directly. All automated phone systems allow consultants to interrupt a call to provide information on promotional deals, emergency alerts, or other things of similar nature. Offering an extremely reduced development time for applications, without costing a fortune, the tools offered can play a major part in the success of any company. Without any disadvantages and without having to worry about maintenance later on, there is no better solution for the creation of VXML applications designed for a specific purpose.

Friday, January 27, 2012

Follow the Simple Steps to develop the iPhone App and Submit it to App Store

It is not as hard or as simple to develop an iPhone App that one might think. As many people have misconception that iPhone Application development is really very hard, I want to remove this conception and motivate them to go for it by following the steps mentioned in the article below.
“Cooking” up an iPhone application also involves a process similar to Cooking. You can find here the steps which should be followed from head to the bottom i.e. from an app idea to its upload on the iTunes.
It must be clear to you that creating an iPhone app or the iPhone application development is not entirely free; also you will need a Mac at some point and so need to use specific Mac-happy code to develop the application.


MCTS Certification, MCITP Certification

Microsoft Commptia A+ Training , Comptia A+ Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


Are you excited now? Follow these exhilarating steps:
1. Design a Smart and Unique Idea

Think of a unique idea and craft the design in a way that one want to use your app. Develop the app in a way that people can pay you for that as they will get more in return of their money.

Please cross check about your idea in the app store that there is no app having the same idea. If you found one, go for a better app which already exists.

2. Get a Mac and Register on Apple as an Developer
As the iPhone development tools are available only for Mac Users, so it is necessary to get a Mac to have your app in the App Store. Mac mini will also serve the purpose.

After having a Mac, go for the free registration to become an official Apple Developer by providing them with your details and agreeing to their terms. Only once the registration is needed. After registration, you can develop iPhone apps for any of the Mac products.

3. Download iPhone Software Development Kit (SDK) and XCODE

Now you are an Official Apple Developer, you are allowed to download iPhone SDK. As SDK comes with all types of documents, sample codes and all the other things you might need later. So, the download is HUGE, and so will take a few hours. Do take care of its version, as it depends on the OS you are using.


As per Apple, “XCode is a complete, full-featured IDE built around a smooth workflow that integrates the editing of source code, with the build and compile steps, through to a graphical debugging experience – all without leaving the view of your source code.” So, go for this and download it.

4. Use the Templates in SDK for iPhone Application development
Start designing the app with the templates available in the SDK. In the SDK, you can find lot of templates to choose one from and also have great You tube clip tutorials to tell you how to use these templates effectively.
5. Program your App using Objective-C

Understand the basics of Objective-C and program your app. You can take screenshots as you precede that helps you remember what you tried. Time required by the apps totally depends on the app features and the details you want in it.

6. Test the application

Make the full use of the huge download of SDK you have done. SDK comes with a lovely iPhone simulator, load your app in it and test it on the simulator. Use the app in all the possible ways one can use and try to work out as many bugs as you can. Test it completely.

7. Upload the iPhone application on iTunes for Approval

Loading an app into iTunes costs a one time member fee of $99 (USD), and it is must to be paid. There is no way to get away of this amount. But, if your app is worthy, you can earn it back in many folds.

Test your App completely and work on all the issues and then submit for approval. Apple takes few days to approve it so be patient and wait for the response.

Monday, January 23, 2012

FC0-U41 Q & A / Study Guide

Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com


QUESTION 1
Which of the following statements about a riser card is true?

A. It is used to connect a computer in a network.
B. It is used to connect extra microprocessors.
C. It provides extra memory for expansion cards.
D. It is used to extend slots for expansion cards.

Answer: D

Explanation:
Riser card is a circuit board that is used to extend slots for expansion cards and provides the
ability to connect additional expansion cards to the computer. These cards are used with LPX
motherboards. With the introduction of ATX motherboards, riser cards are rarely used. In ATX
motherboards, the expansion cards connect directly to the computer motherboard instead of using
riser cards.
What is LPX?
LPX is a motherboard form or that is used in some desktop computers. In LPX motherboards,
expansion cards are inserted into a riser card that contains several slots. Unlike other common
form ors such as AT and ATX, the expansion cards in LPX are not vertical, but parallel to the
motherboard.
The LPX form or is designed for smaller cases, and usually it is used for connecting two or three
expansion cards.


QUESTION 2
Which of the following devices is used for accessing the data on Secure Digital (SD) card, MMC
card, and CompactFlash (CF)?

A. E-book reader
B. Memory card reader
C. Smart card reader
D. Barcode reader

Answer: B

Explanation:
A memory card reader is a device, typically having a USB interface, for accessing the data on a
memory card such as a CompactFlash (CF),
Secure Digital (SD) or MultiMediaCard (MMC).
Answer option C is incorrect. Smart card readers are used to read smart cards. It is used as a
communications medium between the smart card and a host.
Answer option D is incorrect. A barcode reader (or barcode scanner) is an electronic device for
reading printed barcodes.
Answer option A is incorrect. There is no such device as e-book reader.


QUESTION 3
Which of the following can be used to accomplish authentication?
Each correct answer represents a complete solution. Choose all that apply.

A. Biometrics
B. Encryption
C. Password
D. Token

Answer: A,C,D

Explanation:
The following can be used to accomplish authentication.
1. Password
2. Biometrics
3. Token
A password is a secret word or string of characters that is used for authentication, to prove
identity, or gain access to a resource.
What is authentication?
Authentication is a process of verifying the identity of a person, network host, or system process.
The authentication process compares the provided credentials with the credentials stored in the
database of an authentication server.
What is biometrics?
Biometrics is a method of authentication that uses physical characteristics, such as fingerprints,
scars, retinal patterns, and other forms of biophysical qualities to identify a user. Nowadays, the
usage of biometric devices such as hand scanners and retinal scanners is becoming more
common in the business environment. A token may be a physical device or software token that an
authorized user of computer services is given to ease authentication.
Answer option B is incorrect. Encryption can be used to accomplish security and not
authentication.


QUESTION 4
Which of the following devices can cause great harm to one's life with lethal electric shocks?
Each correct answer represents a complete solution. Choose two.

A. SMPS
B. Floppy drive
C. Monitor
D. Keyboard.

Answer: A,C

Explanation:
A computer monitor and SMPS are at high voltage. Therefore, these devices can be fatal. They
usually have large amount of electric charge stored in capacitors for days after they have been
unplugged from power source.
What is SMPS?
Switch Mode Power Supply (SMPS) is a device that converts raw input power to controlled voltage
and current for the operation of electronic equipment. SMPS uses switches for high efficiency.
Answer options D and B are incorrect. Keyboards and floppy drives do not store electric charge.
Therefore, they cannot cause lethal electric shocks.


QUESTION 5
Which of the following ports on a computer are used to connect a keyboard?
Each correct answer represents a complete solution. Choose two.

A. USB
B. DB-25
C. PS/2
D. DB-9

Answer: A,C

Explanation:
The PS/2 and USB ports on a computer are used to connect a keyboard.
What is USB?
Universal Serial Bus (USB) is a high speed bus standard developed by Compaq, IBM, DEC, Intel,
Microsoft, NEC, and Northern Telecom. It provides the Plug and Play capability of Windows to
external hardware devices. USB supports hot plugging, which means that a USB device can be
installed or removed while the computer is running. A single USB port can be used to connect up to
127 peripheral devices, such as CD-ROM drives, tape drives, keyboards, scanners etc. USB 1.1
has a maximum data transfer rate of 12 Mbps, whereas USB 2.0 has a maximum data transfer
rate of 480 Mbps. USB 2.0 is fully backward compatible with USB 1.1.
Answer options D and B are incorrect. The DB-9 and DB-25 port types on the computer are used
as serial ports. A DB-9 male type port has 9 pins, whereas a DB-25 male type port has 25 pins.
What is a serial port?
Serial port is the primary means for connecting modems and mouse to a computer. There are two
types of serial port connectors, 9-pin and 25-pin. The word serial refers to the data is sent in
series, one bit at a time, over a single wire. This design is significantly slower than sending 8 bits
at a time via a parallel channel, but serial signals can travel much farther without degradation.


QUESTION 6
Which of the following features are related to power management?
Each correct answer represents a complete solution. Choose two.

A. Hot plugging
B. Hibernate mode
C. Standby mode
D. Safe mode

Answer: B,C

Explanation:
The Hibernate mode and Standby mode are features related to power management.
Hibernate mode is a power saving feature for computers. In hibernate mode, the current state of a
computer is saved to the hard disk, and the computer shuts down. A user will have to power on
the computer to restore the previous settings. When a computer resumes from hibernate mode, it
reads the saved settings from the disk and restores the system state as it was before it entered
hibernate mode. By default, hibernate mode is disabled. If a computer is not ACPI-enabled or
APM-enabled, users will have to enter hibernate mode manually. Users cannot set the computer
to automatically hibernate after a certain time. With ACPI-enabled and APM-enabled computers,
users are able to set hibernate mode automatically.
The standby mode is a power saving feature for computers. In this mode, a computer does not
shut down completely. The computer goes to low power state and, as a result, it consumes less
power.
When the computer resumes from the standby mode, full power is restored to its devices. During
the standby mode, if the power supply is disconnected or interrupted, data might be lost. The
standby mode is available automatically on ACPI-enabled or APM-enabled computers. Users do
not need to enable this mode manually. This mode is not available in non-ACPI and non-APM
based computers.
Answer option A is incorrect. Hot plugging is a feature in which a device can be installed or
removed while the computer is running.
Answer option D is incorrect. Safe Mode is a Windows feature used to start a computer with basic
drivers, such as mouse, keyboard, etc. It bypasses blocking issues, such as system corruption, or
installation of incompatible drivers or system services, enabling the Administrator to resolve such
issues.


QUESTION 7
Which of the following are types of LCD monitors?
Each correct answer represents a complete solution. Choose two.

A. SVGA
B. Active Matrix
C. Passive Matrix
D. X-Matrix

Answer: B,C

Explanation:
Two types of LCDs are available.
Active matrix
Passive matrix
Active matrix LCDs uses individual transistors to control each pixel on the screen. This type of
LCD consumes more power but provides sharper images than the passive matrix LCD. Passive
matrix Passive matrix screens do not refresh quickly to rapid changes. The passive matrix screen
displays weak colors. LCDs consume less power and are cheaper than Active matrix LCDs.
Answer option A is incorrect. SVGA is a type of CRT monitor used with the Desktop computers,
and not the LCD monitor.
Answer option D is incorrect. There is no LCD display type such as X-Matrix.


QUESTION 8
Which of the following transmits all ATSC HDTV standards and supports 8-channel digital audio?

A. DVI
B. S-Video
C. SVGA
D. HDMI

Answer: D

Explanation:
HDMI stands for High-Definition Multimedia Interface. It is a standard, uncompressed, and alldigital
audio/video interface. HDMI is capable of delivering the highest quality digital video and
multichannel digital audio on a single cable. It provides an interface between any audio/video
sources, such as a DVD player or a computer and a digital television (DTV) or video monitor.
HDMI transmits all ATSC HDTV standards and supports 8-channel digital audio, with extra
bandwidth to accommodate future enhancements. HDMI has two types of connectors. Type A and
Type B. Type A and Type B connectors use 19 pins and 29 pins, respectively. The Type B
connector is designed for very high-resolution displays that are expected in near future.
Answer option B is incorrect. S-Video, also known as Y/C video, stands for Super-Video. It is a
technology for video transmission. Using this technology, the video is transmitted into two
separate signals. One is used for color, and the other for brightness. Sometimes S-Video signals
are considered as a type of component video signal. However, its quality is inferior to other
complex component video schemes such as RGB. This technology produces sharper images than
those produced by composite video, which carries the entire set of signals in a single line. For
using SVideo, the device sending the signal must support S-Video output and the device receiving
the signal needs to have an S-Video input jack.
Answer option A is incorrect. DVI stands for Digital Visual Interface. It is a standard for high speed,
high resolution digital display invented by
Digital Display Working Group (DDWG). DVI accommodates analog and digital interfaces with a
single connector. New video cards have DVI as well as VGA ports built into them. Most of LCD
monitors come with a 15-pin VGA connection cable, even if they are capable of handling digital
signals coming from DVI connections. However, some monitors come with both types of cables.
DVI has three main categories of connectors. They are. DVI-A, DVI-D, and DVI-I. DVI-A is an
analog-only connector, DVI-D is a digital-only connector, and DVI-I is an analog/digital connector.
DVI-D and DVI-I connectors are of two types. single link and dual link. DVI supports UXGA and
HDTV with a single set of links.
Higher resolutions such as 1920 x 1080, 2048 x 1536, or more can be supported with dual links.
Answer option C is incorrect. A VGA or SVGA connector is a 15-pin, three rows, female connector,
on the back of a PC used for connecting monitors. Reference. "http.//en.wikipedia.org/wiki/High-
Definition_Multimedia_Interface"


QUESTION 9
You are handling IT support for a sales company. One of the sales representatives complains that
his laptop does not have a network card. You wish to add one via an expansion slot. What type of
expansion card should you use?

A. MCA
B. PCMCIA
C. PCI
D. AGP

Answer: B

Explanation:
PCMCIA is a widely used expansion card slot for laptops.
What is PCMCIA card? Personal Computer Memory Card International Association (PCMCIA)
card is also known as PC card.
The PC card uses a small expansion slot and is primarily used in laptops. However, PC cards are
also available in some of the desktop computers. There are three types of PCMCIA cards.
1.Type I
2.Type II
3.Type III
Answer option C is incorrect. PCI slots are used in PC's, not laptops.
Answer option D is incorrect. AGP is a legacy graphics slot for PC's.
What is AGP (Accelerated Graphics Port)?
AGP is a high speed 32-bit bus designed for high performance graphics and video support. It
allows a video card to have direct access to a computer's RAM, which enables fast video
performance. AGP provides a bandwidth of up to 2,133 MB/second.
Answer option A is incorrect. MCA is a legacy PC slot.
Reference. http.//www.wisegeek.com/what-is-an-expansion-card.htm


QUESTION 10
Which of the following terms refers to an anti-virus software file that is updated from time to time to
protect a computer from new viruses?

A. Definition
B. Modules
C. Service pack
D. Hotfix

Answer: A

Explanation:
Definition is an anti-virus software file that should be updated at regular intervals to protect a
computer from new viruses. This file is also known as virus definition file. The virus definition file
contains information about the latest viruses, which helps identify new viruses and protect
computers from them.
Answer option D is incorrect. Hotfix is a collection of files used by Microsoft for software updates
that are released between major service pack releases. A hotfix is about a problem, occurring
under specific circumstances, which cannot wait to be fixed till the next service pack release.
Hotfixes are generally related to security problems. Hence, it is essential to fix these problems as
soon as possible.
Answer option C is incorrect. A service pack is a collection of Fixes and Patches in a single
product. A service pack can be used to handle a large number of viruses and bugs or to update an
operating system with advanced and better capabilities. A service pack usually contains a number
of file replacements.
Answer option B is incorrect. This term does not refer to any anti-virus software file. Reference.
"http.//en.wikipedia.org/wiki/Computer_virus"

Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com

Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com


QUESTION 1
Which of the following statements about a riser card is true?

A. It is used to connect a computer in a network.
B. It is used to connect extra microprocessors.
C. It provides extra memory for expansion cards.
D. It is used to extend slots for expansion cards.

Answer: D

Explanation:
Riser card is a circuit board that is used to extend slots for expansion cards and provides the
ability to connect additional expansion cards to the computer. These cards are used with LPX
motherboards. With the introduction of ATX motherboards, riser cards are rarely used. In ATX
motherboards, the expansion cards connect directly to the computer motherboard instead of using
riser cards.
What is LPX?
LPX is a motherboard form or that is used in some desktop computers. In LPX motherboards,
expansion cards are inserted into a riser card that contains several slots. Unlike other common
form ors such as AT and ATX, the expansion cards in LPX are not vertical, but parallel to the
motherboard.
The LPX form or is designed for smaller cases, and usually it is used for connecting two or three
expansion cards.


QUESTION 2
Which of the following devices is used for accessing the data on Secure Digital (SD) card, MMC
card, and CompactFlash (CF)?

A. E-book reader
B. Memory card reader
C. Smart card reader
D. Barcode reader

Answer: B

Explanation:
A memory card reader is a device, typically having a USB interface, for accessing the data on a
memory card such as a CompactFlash (CF),
Secure Digital (SD) or MultiMediaCard (MMC).
Answer option C is incorrect. Smart card readers are used to read smart cards. It is used as a
communications medium between the smart card and a host.
Answer option D is incorrect. A barcode reader (or barcode scanner) is an electronic device for
reading printed barcodes.
Answer option A is incorrect. There is no such device as e-book reader.


QUESTION 3
Which of the following can be used to accomplish authentication?
Each correct answer represents a complete solution. Choose all that apply.

A. Biometrics
B. Encryption
C. Password
D. Token

Answer: A,C,D

Explanation:
The following can be used to accomplish authentication.
1. Password
2. Biometrics
3. Token
A password is a secret word or string of characters that is used for authentication, to prove
identity, or gain access to a resource.
What is authentication?
Authentication is a process of verifying the identity of a person, network host, or system process.
The authentication process compares the provided credentials with the credentials stored in the
database of an authentication server.
What is biometrics?
Biometrics is a method of authentication that uses physical characteristics, such as fingerprints,
scars, retinal patterns, and other forms of biophysical qualities to identify a user. Nowadays, the
usage of biometric devices such as hand scanners and retinal scanners is becoming more
common in the business environment. A token may be a physical device or software token that an
authorized user of computer services is given to ease authentication.
Answer option B is incorrect. Encryption can be used to accomplish security and not
authentication.


QUESTION 4
Which of the following devices can cause great harm to one's life with lethal electric shocks?
Each correct answer represents a complete solution. Choose two.

A. SMPS
B. Floppy drive
C. Monitor
D. Keyboard.

Answer: A,C

Explanation:
A computer monitor and SMPS are at high voltage. Therefore, these devices can be fatal. They
usually have large amount of electric charge stored in capacitors for days after they have been
unplugged from power source.
What is SMPS?
Switch Mode Power Supply (SMPS) is a device that converts raw input power to controlled voltage
and current for the operation of electronic equipment. SMPS uses switches for high efficiency.
Answer options D and B are incorrect. Keyboards and floppy drives do not store electric charge.
Therefore, they cannot cause lethal electric shocks.


QUESTION 5
Which of the following ports on a computer are used to connect a keyboard?
Each correct answer represents a complete solution. Choose two.

A. USB
B. DB-25
C. PS/2
D. DB-9

Answer: A,C

Explanation:
The PS/2 and USB ports on a computer are used to connect a keyboard.
What is USB?
Universal Serial Bus (USB) is a high speed bus standard developed by Compaq, IBM, DEC, Intel,
Microsoft, NEC, and Northern Telecom. It provides the Plug and Play capability of Windows to
external hardware devices. USB supports hot plugging, which means that a USB device can be
installed or removed while the computer is running. A single USB port can be used to connect up to
127 peripheral devices, such as CD-ROM drives, tape drives, keyboards, scanners etc. USB 1.1
has a maximum data transfer rate of 12 Mbps, whereas USB 2.0 has a maximum data transfer
rate of 480 Mbps. USB 2.0 is fully backward compatible with USB 1.1.
Answer options D and B are incorrect. The DB-9 and DB-25 port types on the computer are used
as serial ports. A DB-9 male type port has 9 pins, whereas a DB-25 male type port has 25 pins.
What is a serial port?
Serial port is the primary means for connecting modems and mouse to a computer. There are two
types of serial port connectors, 9-pin and 25-pin. The word serial refers to the data is sent in
series, one bit at a time, over a single wire. This design is significantly slower than sending 8 bits
at a time via a parallel channel, but serial signals can travel much farther without degradation.


QUESTION 6
Which of the following features are related to power management?
Each correct answer represents a complete solution. Choose two.

A. Hot plugging
B. Hibernate mode
C. Standby mode
D. Safe mode

Answer: B,C

Explanation:
The Hibernate mode and Standby mode are features related to power management.
Hibernate mode is a power saving feature for computers. In hibernate mode, the current state of a
computer is saved to the hard disk, and the computer shuts down. A user will have to power on
the computer to restore the previous settings. When a computer resumes from hibernate mode, it
reads the saved settings from the disk and restores the system state as it was before it entered
hibernate mode. By default, hibernate mode is disabled. If a computer is not ACPI-enabled or
APM-enabled, users will have to enter hibernate mode manually. Users cannot set the computer
to automatically hibernate after a certain time. With ACPI-enabled and APM-enabled computers,
users are able to set hibernate mode automatically.
The standby mode is a power saving feature for computers. In this mode, a computer does not
shut down completely. The computer goes to low power state and, as a result, it consumes less
power.
When the computer resumes from the standby mode, full power is restored to its devices. During
the standby mode, if the power supply is disconnected or interrupted, data might be lost. The
standby mode is available automatically on ACPI-enabled or APM-enabled computers. Users do
not need to enable this mode manually. This mode is not available in non-ACPI and non-APM
based computers.
Answer option A is incorrect. Hot plugging is a feature in which a device can be installed or
removed while the computer is running.
Answer option D is incorrect. Safe Mode is a Windows feature used to start a computer with basic
drivers, such as mouse, keyboard, etc. It bypasses blocking issues, such as system corruption, or
installation of incompatible drivers or system services, enabling the Administrator to resolve such
issues.


QUESTION 7
Which of the following are types of LCD monitors?
Each correct answer represents a complete solution. Choose two.

A. SVGA
B. Active Matrix
C. Passive Matrix
D. X-Matrix

Answer: B,C

Explanation:
Two types of LCDs are available.
Active matrix
Passive matrix
Active matrix LCDs uses individual transistors to control each pixel on the screen. This type of
LCD consumes more power but provides sharper images than the passive matrix LCD. Passive
matrix Passive matrix screens do not refresh quickly to rapid changes. The passive matrix screen
displays weak colors. LCDs consume less power and are cheaper than Active matrix LCDs.
Answer option A is incorrect. SVGA is a type of CRT monitor used with the Desktop computers,
and not the LCD monitor.
Answer option D is incorrect. There is no LCD display type such as X-Matrix.


QUESTION 8
Which of the following transmits all ATSC HDTV standards and supports 8-channel digital audio?

A. DVI
B. S-Video
C. SVGA
D. HDMI

Answer: D

Explanation:
HDMI stands for High-Definition Multimedia Interface. It is a standard, uncompressed, and alldigital
audio/video interface. HDMI is capable of delivering the highest quality digital video and
multichannel digital audio on a single cable. It provides an interface between any audio/video
sources, such as a DVD player or a computer and a digital television (DTV) or video monitor.
HDMI transmits all ATSC HDTV standards and supports 8-channel digital audio, with extra
bandwidth to accommodate future enhancements. HDMI has two types of connectors. Type A and
Type B. Type A and Type B connectors use 19 pins and 29 pins, respectively. The Type B
connector is designed for very high-resolution displays that are expected in near future.
Answer option B is incorrect. S-Video, also known as Y/C video, stands for Super-Video. It is a
technology for video transmission. Using this technology, the video is transmitted into two
separate signals. One is used for color, and the other for brightness. Sometimes S-Video signals
are considered as a type of component video signal. However, its quality is inferior to other
complex component video schemes such as RGB. This technology produces sharper images than
those produced by composite video, which carries the entire set of signals in a single line. For
using SVideo, the device sending the signal must support S-Video output and the device receiving
the signal needs to have an S-Video input jack.
Answer option A is incorrect. DVI stands for Digital Visual Interface. It is a standard for high speed,
high resolution digital display invented by
Digital Display Working Group (DDWG). DVI accommodates analog and digital interfaces with a
single connector. New video cards have DVI as well as VGA ports built into them. Most of LCD
monitors come with a 15-pin VGA connection cable, even if they are capable of handling digital
signals coming from DVI connections. However, some monitors come with both types of cables.
DVI has three main categories of connectors. They are. DVI-A, DVI-D, and DVI-I. DVI-A is an
analog-only connector, DVI-D is a digital-only connector, and DVI-I is an analog/digital connector.
DVI-D and DVI-I connectors are of two types. single link and dual link. DVI supports UXGA and
HDTV with a single set of links.
Higher resolutions such as 1920 x 1080, 2048 x 1536, or more can be supported with dual links.
Answer option C is incorrect. A VGA or SVGA connector is a 15-pin, three rows, female connector,
on the back of a PC used for connecting monitors. Reference. "http.//en.wikipedia.org/wiki/High-
Definition_Multimedia_Interface"


QUESTION 9
You are handling IT support for a sales company. One of the sales representatives complains that
his laptop does not have a network card. You wish to add one via an expansion slot. What type of
expansion card should you use?

A. MCA
B. PCMCIA
C. PCI
D. AGP

Answer: B

Explanation:
PCMCIA is a widely used expansion card slot for laptops.
What is PCMCIA card? Personal Computer Memory Card International Association (PCMCIA)
card is also known as PC card.
The PC card uses a small expansion slot and is primarily used in laptops. However, PC cards are
also available in some of the desktop computers. There are three types of PCMCIA cards.
1.Type I
2.Type II
3.Type III
Answer option C is incorrect. PCI slots are used in PC's, not laptops.
Answer option D is incorrect. AGP is a legacy graphics slot for PC's.
What is AGP (Accelerated Graphics Port)?
AGP is a high speed 32-bit bus designed for high performance graphics and video support. It
allows a video card to have direct access to a computer's RAM, which enables fast video
performance. AGP provides a bandwidth of up to 2,133 MB/second.
Answer option A is incorrect. MCA is a legacy PC slot.
Reference. http.//www.wisegeek.com/what-is-an-expansion-card.htm


QUESTION 10
Which of the following terms refers to an anti-virus software file that is updated from time to time to
protect a computer from new viruses?

A. Definition
B. Modules
C. Service pack
D. Hotfix

Answer: A

Explanation:
Definition is an anti-virus software file that should be updated at regular intervals to protect a
computer from new viruses. This file is also known as virus definition file. The virus definition file
contains information about the latest viruses, which helps identify new viruses and protect
computers from them.
Answer option D is incorrect. Hotfix is a collection of files used by Microsoft for software updates
that are released between major service pack releases. A hotfix is about a problem, occurring
under specific circumstances, which cannot wait to be fixed till the next service pack release.
Hotfixes are generally related to security problems. Hence, it is essential to fix these problems as
soon as possible.
Answer option C is incorrect. A service pack is a collection of Fixes and Patches in a single
product. A service pack can be used to handle a large number of viruses and bugs or to update an
operating system with advanced and better capabilities. A service pack usually contains a number
of file replacements.
Answer option B is incorrect. This term does not refer to any anti-virus software file. Reference.
"http.//en.wikipedia.org/wiki/Computer_virus"

Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com

Thursday, January 19, 2012

Avaya SMB collaboration platform gets robust new mobile client

Android and Apple iPhone devices will get a richer conferencing and unified communications experience with Avaya IP Office 8.0.

MCTS Certification, MCITP Certification

Microsoft Avaya Exam Training , Avaya Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


The latest version of Avaya’s unified communications platform for small and midsize businesses boasts two major changes: a robust mobile application and the ability to integrate communications features into certain key business applications.

The mobile component of Avaya IP Office 8.0 is called one-X Mobile Preferred for IP Office. Initially available for Android devices (Apple iPhone is coming soon), the application allows users to manage who is on a conference call — allowing them to invite, view, mute or drop participants. The mobile application is recognized by the IP Office presence application, so that people can tell when you are available or shouldn’t be disturbed. There also is a “geopresence” feature that broadcasts where someone is located. (Part of me can see the usefulness of this feature, but it also smacks a little bit of employee babysitting.)

one-X Mobile Preferred is an extension of Avaya’s Essential Mobility technology.

The other major enhancement to Avaya’s latest SMB unified communications platform update comes in the form of new plug-ins to widely used business productivity applications. For example, small businesses can use the Avaya platform to make or receive a call from within a Salesforce.com page; they can also go to a single location to view Google Talk and IP Office contact lists.

Monday, January 2, 2012

220-701 – 220-702 Study Guide

Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com

Contents at a Glance
Introduction 1

Part I A+ Essentials 220-701
CHAPTER 1 Hardware 3
CHAPTER 2 Troubleshooting, Repair, and Maintenance 57
CHAPTER 3 Operating System and Software 95
CHAPTER 4 Networking 147
CHAPTER 5 Security 185
CHAPTER 6 Operational Procedure 211
Part II A+ 220-702
CHAPTER 7 Hardware 241
CHAPTER 8 Operating Systems 285
CHAPTER 9 Networking 339
CHAPTER 10 Security 375

Table of Contents
Introduction. ......................................................................................................................... 1
Part I A+ Essentials 220-701
Chapter 1:
Hardware. .............................................................................................................................. 3
1.1 Categorize storage devices and backup media . ...................................... 3
1.2 Explain motherboard components, types, and features. ...................... 6
1.3 Classify power supplies types and characteristics. ............................... 16
1.4 Explain the purpose and characteristics of CPUs and their features.
................................................................................................................................. 18
1.5 Explain cooling methods and devices . ................................................... 21
1.6 Compare and contrast memory types, characteristics, and their
purpose. ................................................................................................................. 22
1.7 Distinguish between the different display devices and their characteristics
. ................................................................................................................ 25
1.8 Install and configure peripherals and input devices. ........................... 27
1.9 Summarize the function and types of adapter cards . ......................... 29
1.10 Install, configure, and optimize laptop components and features.
................................................................................................................................. 32
1.11 Install and configure printers . ................................................................ 35
Quick-Check Answer Key . ................................................................................ 40
Answers and Explanations . ............................................................................. 41
Chapter 2:
Troubleshooting, Repair, and Maintenance . .............................................................. 57
2.1 Given a scenario, explain the troubleshooting theory. ...................... 57
2.2 Given a scenario, explain and interpret common hardware and operating
system symptoms and their causes . ................................................... 60
2.3 Given a scenario, determine the troubleshooting methods and tools
for printers. .......................................................................................................... 64
2.4 Given a scenario, explain and interpret common laptop issues and
determine the appropriate basic troubleshooting method . .................. 67
2.5 Given a scenario, integrate common preventative maintenance techniques
. .................................................................................................................. 71
Quick-Check Answer Key . ................................................................................ 81
Answers and Explanations . ............................................................................. 82
Chapter 3:
Operating System and Software . .................................................................................. 95
3.1 Compare and contrast the different Windows Operating
Systems and their features. ............................................................................. 95
3.2 Given a scenario, demonstrate proper use of user interfaces . ....... 107
3.3 Explain the process and steps to install and configure the
Windows OS. ................................................................................................... 113
3.4 Explain the basics of boot sequences, methods, and startup
utilities . .............................................................................................................. 123
Quick-Check Answer Key . ............................................................................. 127
Answers and Explanations . ........................................................................... 129
Chapter 4:
Networking . ..................................................................................................................... 147
4.1 Summarize the basics of networking fundamentals, including technologies,
devices, and protocols . .................................................................... 147
4.2 Categorize network cables and connectors and their implementations
. ................................................................................................................... 159
4.3 Compare and contrast the different network types . ......................... 164
Quick-Check Answer Key . ............................................................................. 169
Answers and Explanations . ........................................................................... 170
Chapter 5:
Security . ............................................................................................................................ 185
5.1 Explain the basic principles of security concepts and
echnologies . ...................................................................................................... 185
5.2 Summarize the following security features . ........................................ 193
Quick-Check Answer Key . ............................................................................. 199
Answers and Explanations . ........................................................................... 200
Chapter 6:
Operational Procedure . ................................................................................................. 211
6.1 Outline the purpose of appropriate safety and environmental
procedures and, given a scenario, apply them . ...................................... 211
6.2 Given a scenario, demonstrate the appropriate use of communication
skills and professionalism in the workplace . .................................. 221
Quick-Check Answer Key . ............................................................................. 229
Answers and Explanations . ........................................................................... 230
Part II A+ 220-702
Chapter 7:
Hardware. ......................................................................................................................... 241
1.1 Given a scenario, install, configure, and maintain personal computer
components . ..................................................................................................... 241
1.2 Given a scenario, detect problems, troubleshoot, and repair/replace
personal computer components . ............................................................... 252
1.3 Given a scenario, install, configure, detect problems, troubleshoot,
and repair/replace laptop components . ................................................... 260
1.4 Given a scenario, select and use the following tools . ...................... 261
1.5 Given a scenario, detect and resolve common printer issues . ....... 263
Quick-Check Answer Key . .............................................................................. 270
Answers and Explanations . ........................................................................... 271
Chapter 8:
Operating Systems . ........................................................................................................ 285
2.1 Select the appropriate commands and options to troubleshoot
and resolve problems . .................................................................................... 285
2.2 Differentiate between Windows Operating System directory structures
(Windows 2000, XP, Vista, and Windows 7) . .............................. 296
2.3 Given a scenario, select and use system utilities/tools and
evaluate the results . ........................................................................................ 299
2.4 Evaluate and resolve common issues . ................................................... 310
Quick-Check Answer Key . ............................................................................. 319
Answers and Explanations . ........................................................................... 321

Chapter 9:
Networking . ..................................................................................................................... 339
3.1 Troubleshoot client-side connectivity issues using appropriate
tools . ................................................................................................................... 339
3.2 Install and configure a small office home office (SOHO)
network . ............................................................................................................ 352
Quick-Check Answer Key . ............................................................................. 361
Answers and Explanations . ........................................................................... 362
Chapter 10:
Security . ............................................................................................................................ 375
4.1 Given a scenario, prevent, troubleshoot, and remove viruses
and malware . ................................................................................................... 375
4.2 Implement security and troubleshoot common issues . .................. 379
Quick-Check Answer Key . .............................................................................. 395
Answers and Explanations . ........................................................................... 396

==================================================================
Introduction
Welcome to CompTIA A+ Practice Questions Exam Cram. The sole purpose of
this book is to provide you with practice questions that are complete with
answers and explanations to help you learn, drill, and review for the CompTIA
A+ certification exam. The book offers many questions that will help you practice
each exam objective and will help you assess your knowledge before you
write the real exam. The detailed answers to every question will help you reinforce
your knowledge about different issues involving the concepts associated
with the updated A+ exam (2009 Edition), which also includes topics on
Windows 7 and IPv6.
Who This Book Is For
If you have studied the content for both the 220-701 and 220-702 exam and feel
you are ready to put your knowledge to the test, but you are not sure that you
want to take the real exam yet, this book is for you! If you have answered other
practice questions or unsuccessfully taken the real exam, and want to do more
practice questions before going to take the real exam, this book is for you, too!
Even when the exam is done and you have passed with flying colors and have the
A+ certificate in your pocket, keep the book handy on your desktop to look for
answers to your everyday security issues.
What You Will Find in This Book
This book is all about practice questions! The practice questions in the book,
some very easy and others with a little complicated problem scenario, all are
intended to raise your confidence level before you take the real exam. You will
find questions that you will face in real life.
This book is organized according to the objectives published by CompTIA for
the 220-701: CompTIA A+ Essentials and 220-702: CompTIA A+ (2009
Edition) exams. Each chapter corresponds to an exam objective, and in every
chapter, you will find the following three elements:
. Practice Questions: These are the numerous questions that will help
you learn, drill, and review exam objectives. All of the questions in this
section are multiple-choice type. Choose the correct answer based on
your knowledge of security.
. Quick-Check Answer Key: After you have finished answering the questions,
you can quickly grade your exam from this section. Only correct

CompTIA A+ 220-701 and 220-701 Practice Questions Exam Cram
answers are given in this section. No explanations are offered yet! Even if
you have answered a question incorrectly, do not be discouraged. Just
move on! Keep in mind that this is not the real exam. You can always
review the topic and do the questions again.
. Answers and Explanations: This section provides you with correct
answers as well as further explanations about the content posed in that
question. Use this information to learn why an answer is correct and to
reinforce the content in your mind for the exam day.
Note
It is not possible to reflect a real exam on a paper product. As mentioned earlier, the purpose
of the book is to help you prepare for the exam and not provide you with real exam
questions. Neither the author nor the publisher can guarantee that you will pass the exam
only by memorizing the practice questions given in this book.

Hints for Using This Book
Because this book is a paper practice product, you might want to complete your
exams on a separate piece of paper so that you can reuse the practice questions
again and again without having previous answers in your way. Also, a general
rule of thumb across all practice questions products is to make sure that you are
scoring in the high 80% to 90% range for all topics before attempting the real
exam. The higher percentages you score on practice question products, the better
your chances for passing the real exam. Of course, we cannot guarantee a
passing score on the real exam, but we can offer you plenty of opportunities to
practice and assess your knowledge level before you enter the real exam.
When you have completed the exam on paper, use the companion CD to take a
timed exam. This will further help you gain confidence and make a self-assessment
in case you need more study. Your results will indicate the exam objectives
in which you need further study or hands-on practice.
Need Further Study?
Are you having a hard time correctly answering these questions? If so, you probably
need further review of all exam objectives. Be sure to see the following sister
products to this book:
CompTIA A+ Exam Cram, Fifth Edition by David L. Prowse, (ISBN:
9780789747921)
CompTIA A+ Cert Flash Cards Online (220-701, 220-702), Retail Packaged Version,
Third Edition, by Scott Honeycutt (ISBN: 9780132674553)

1 C H A P T E R O N E
Hardware

The first domain for the A+ Essentials (220-701) exam is hardware, which
focuses on teaching you to identify components and to demonstrate a basic
knowledge of hardware technology. This domain is essential because it gives
you a background for the other domains and also counts as 27% of the test
score, the largest percentage of all the domains. It also includes the most
objectives because today’s PCs have such a wide variety of hardware and
technology:
The objectives for this domain are as follows:
. 1.1—Categorize storage devices and backup media
. 1.2—Explain motherboard components, types, and features
. 1.3—Classify power supplies types and characteristics
. 1.4—Explain the purpose and characteristics of CPUs and their features
. 1.5—Explain cooling methods and devices
. 1.6—Compare and contrast memory types, characteristics, and their
purpose
. 1.7—Distinguish between the different display devices and their
characteristics
. 1.8—Install and configure peripherals and input devices
. 1.9—Summarize the function and types of adapter cards
. 1.10—Install, configure, and optimize laptop components and features
1.1 Categorize storage devices and backup media
. FDD
. HDD
. Solid state vs. magnetic
. Optical drives
. CD/DVD/RW/Blu-Ray
. Removable storage
. Tape drive
. Solid state (e.g., thumb drive, flash, SD cards, USB)
. External CD-RW and hard drive
. Hot swappable devices and non-hot swappable devices From <

Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com

Wednesday, December 21, 2011

The Importance of Learnability for User Interface Design

As the computing landscape evolves to include an ever more sophisticated range of products and form factors the usability of the software and websites we use is continually being reviewed and refined. A crucial component of user interface design is usability. Simply put, a user interface design with poor usability is going to frustrate users and drive them to seek alternatives as quickly as possible. Another important factor tied to usability is learnability. After all, there is always a learning curve associated with every new user interface design we come across with varying degrees of steepness.

MCTS Certification, MCITP Certification

Microsoft Commptia A+ Training , Comptia A+ Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


For the longest time building a user interface design (User Interface Design, Interface Design) meant optimizing usability for one particular dimension, if I may call it that. This dimension, of course, is the venerable desktop. Nowadays there are smartphones and tablets to contend to, all of which need a unique user interface design by virtue of touchscreens and other natural user interfaces as the favored mode of input rather than, say, the mouse. This stratification of user interface designs across devices means that not every UI design element can be instantly usable. At some point users are going to have to learn how to use it. Learnability in this case means making decisions on which features to bury in advanced settings and which ones should be on the default user interface design (this is what users see when they use a website or app for the first time). There are a couple of things to consider when optimizing a website or software application's user interface design for learnability:-


• Importance – How critical is your website or software application to a user? Users are far more likely to spend time learning a user interface design if it is crucial to their workflow, for example. One has to look no further than, say, Photoshop or Final Cut Pro. Both are complicated software applications yet everyday users spend time learning how to get the most out of the complex user interface design to fulfill their aims.

• Frequency – We humans are creatures of habit. Despite the countless number of websites and software applications out there we tend to have a core nucleus of favorites that we revisit again and again. The more we use a user interface design the more quickly we learn to use it, with each repeat visit making us use it all the more efficiently.

• Cost – The more someone pays for an application the more time they are going to invest in learning how to use it. This could have something to do with the Value Attribution theory whereby we assume something expensive is worth our investment and the resultant heightened expectations help us persevere with a user interface design longer. This, however, is no justification for charging exorbitant prices!


• Alternatives – The number, and quality, of alternative tools available to users also determines how long they spend learning a user interface design. The more unique or the higher quality inherent in your website or application the more likely users will stick by you. However, be sure to fix all usability issues before a better alternative crops up to tempt your users away.

• Simplicity – For the sake of learnability it is important to keep the default user interface design as simple as possible. Jamming every possible feature in the default user interface design only serves to make it appear to require more time to get to know. This can put off potential users who may seek a simpler solution elsewhere.

A great proponent of incorporating learnability into a user interface design is Google, which is hardly surprising considering how great user interface design (User Interface Design, Interface Design Software) has always been one of their traits. A lot of their apps have a simple default user interface design that most users can learn to use relatively easy yet there are a number of advanced features available. The Google iOS app is an example of this. When it is loaded for the first time there is a tutorial overlay that sits on top of the default user interface design giving concise introductions to the features of the app. A lot of other iOS and Android apps are similar in the way they gently provide a new user with enough information to get them comfortable with the app rather than simply letting them muddle through via trial-and-error. In effect learnability is all about how user interface designers help users to help themselves.

Friday, December 16, 2011

Cloud Computing Has a Much Wider Scope

Cloud computing is a term used to describe both a platform and a type of application. A cloud computing platform dynamically provisions, configures, re-configures, and de-provisions servers as needed. Cloud servers are physical machines or virtual machines. Advanced clouds typically include other computing resources such as storage area networks (SANs), network equipments, firewalls, and other types of security devices. Cloud computing also describes applications that can be easily accessed through the Internet. Cloud applications utilize huge data centers and robust servers that host Web applications and Web services. Anyone with a suitable Internet connection and a standard Web browser can access a cloud application.

MCTS Certification, MCITP Certification

Microsoft Commptia A+ Training , Comptia A+ Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com



Cloud comprises of a huge pool of virtualized computer resources. A cloud can host a variety of different workloads, including batch style back end jobs and interactive, user facing applications. Cloud allows workloads to be deployed and scaled out quickly through the rapid provisioning of virtual machines or physical machines. Cloud supports redundant, self recovering, highly scalable programming models that allow workloads to recover from many unavoidable hardware and software failures. Cloud computing technology allows monitoring of resource use in real time to enable rebalancing of allocations when ever required.



Cloud computing environments support grid computing by quickly providing physical and virtual servers on which the grid applications can run. Cloud computing should not be confused with grid computing. Grid computing involves dividing a large task into many smaller tasks that run in parallel on separate servers. Grids require many computers, typically in the thousands, and commonly use servers, desktops, and laptops.


Cloud computing technology also supports non-grid environments, such as a three tier Web architecture running standard or Web 2.0 applications. A cloud is more than a collection of computer resources because cloud computing technology also provides a mechanism to manage those resources. Management includes tasks, such as, provisioning, change requests, re-imaging, workload re-balancing, de-provisioning, and monitoring.


Cloud Computing Benefits


Application hosting service providers which utilize cloud hosting technology allow small and medium size enterprises or SMEs to achieve more efficient use of IT hardware and software investments. They do this by breaking down the physical barriers inherent in isolated systems, and automating the management of the group of systems as a single entity. Cloud Computing is an example of an ultimately virtualized system, and a natural evolution for data centers that employ automated systems management, workload balancing, and virtualization technologies.



A cloud infrastructure offers a cost efficient model for delivering information services, reducing IT management complexity, promoting innovation, and increasing responsiveness through real time workload balancing.


The Cloud makes it possible to launch Web 2.0 applications quickly and to scale up applications as much as needed. The platform supports traditional Java and Linux, Apache, MySQL, PHP (LAMP) stack based applications as well as new architectures such as MapReduce and the Google File System, which provide a means to scale applications across thousands of servers instantly. Cloud Hosting is possible for many applications - Windows Server software, MS SQL Server, QuickBooks accounting software, MS Office Server, ACT! CRM, ProSeries Tax software, Drake Tax software, Lacerte Tax software, ATX tax software, MS Project, etc. Storage and maintenance of large volumes of data is a reality with cloud hosting technology.


Large amounts of computer resources, in the form of virtual machines, can be provisioned and made available for new applications within minutes instead of days or weeks. Developers can gain access to these resources through a portal and put them to use immediately. Several products are available that provide virtual machine capabilities, including proprietary ones such as VMware, and open source alternatives, such as XEN.


Many customers are interested in cloud infrastructures to serve as platforms for innovation, particularly in countries that want to foster the development of a highly skilled, high-tech work force. They want to provide startups and research organizations with an environment for idea exchange, and the ability to rapidly develop and deploy new product prototypes.

Monday, December 12, 2011

How to woo the MBA admissions committee

What do admissions committees look for in an MBA candidate? The answer is as varied as the motivations of the applicants and the many flavours of MBA degrees that now make up part of the Canadian business school landscape.

MCTS Certification, MCITP Certification

Microsoft CCNA Certification, CCNA Training and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


When it comes to gaining entry, previous academic performance and Graduate Management Admission Test (GMAT) scores are critical. "We look for a solid B in the final two years of an undergraduate degree and we have minimum required scores on both the quantitative and verbal sections of the GMAT," says Isabella Piatek, manager MBA programs at the DeGroote School of Business. That said, there are other qualities that can help sway the decision. "We look for a well rounded candidate to bring a diverse set of experiences, who can communicate well, has passion and is engaged," says Ms. Piatek.

One of the key areas of focus for Brock University is fit, says Shari Sekel, director of graduate programs for the university's faculty of business. "We are trying to make sure that what a student is trying to achieve with their MBA is something our program is capable of delivering. Not all MBA programs are alike. There are similarities, but they all have different specializations, styles of learn-ing, opportunities, extra-curricular activities. We want to make sure there is a good fit between the expectations of the student and the realities of our program."


Who is a good fit for Brock's MBA program? "Someone who looks beyond the books. Some of our courses base 30% of the final grade on in class contribution," says Ms. Sekel. "We are looking for people very comfortable in participating, sharing ideas, asking questions. We are also looking for them to get involved outside the classroom and have a lot of extra-curricular opportunities to help them round out the graduate experience."

It is exactly for that reason that Ms. Sekel has concerns about the emphasis placed on GMAT scores. Administered by U.S.-based Graduate Management Admission Council (GMAC), the GMAT has become the standard assessment tool to measure the likely success of MBA candidates used by business schools around the globe. The test is divided into three parts: verbal, quantitative and analytical writing skills.

"The GMAT is well regarded and widely used but I'm torn on the subject. The admissions function is all about predicting who is going to be the most successful in the MBA program. The GMAT serves as a common evaluation tool because all students have to write the same test. That's one of its most important uses," says Ms. Sekel.


"On the other hand, we have to recognize the GMAT is not the only piece of an application that's important, particularly when you are looking at students fresh from undergraduate programs. If you have students even in history or science who are scoring well, getting As, these are students with a good work ethic, they are motivated and those are some of the skill sets that will serve them well at the MBA level. The GMAT holds less weight in those instances for us."

Jenni Denniston, associate director of MBA recruiting and admissions at the Richard Ivey School of Business, sees another drawback to the GMAT. "The way the three components of the GMAT are tested is not the way they are going to be tested in an MBA program."

And for international students, the fact that the test is written in English can pose challenges. "When you assess GMAT performance for strengths and weaknesses, it is difficult to separate out what percentage of their score relates to language strength or challenge, versus what part of the score represents quantitative content," says Ms. Sekel.

"Maybe it doesn't matter. Maybe some schools are using the GMAT as a language assessment as well. But I find that it muddles the analysis a little bit for nonnative English speakers."

Even so, top-tier accredited MBA programs rely on the GMAT - and sometimes, so do employers. "Some recruiters look at your GMAT score as a differentiator. Typically, your top consulting firms and banks want to see the GMAT in addition to grades when they are looking at applications," says Ms. Denniston. "Not a lot of people realize that."

While Ms. Denniston appreciates the apples-to-apples comparison the GMAT offers, she cautions against focusing too narrowly on the score. "We look at candidates holistically. You can have some strong, successful people who can't take standardized tests.

"On the flip side, you can get fantastic test takers who aren't able to contribute to a learning environment. I think it's an important data point, but I don't think it's the most important data point."

Different Types of Topologies

Lane Topologies

Each PC on the network must have access to the network cabling structure so that there is a manageable and systematic flow of information between the file server and workstations. The LAN adapter board produces and regulates this flow. It is the electrical design of the actual LAN card that determines what kind of cable topology it requires.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


The physical layout of the LAN, or the way the workstations are connected to each other, is called the LAN topology, or architecture.

There are three basic LAN topologies in general use today; the Linear Bus, the Star and the Ring. Some vendors use hybrid topologies combining elements from two of the three basic topologies. Each of three basic topologies has distinct characteristics.

Ring Topology

A ring topology is one in which all stations are linked to form a continues loop. A single channel connects all the computers and there is no central computer in this topology. Data may flow around the ring only one direction. A coded electric signal called a token passes around the ring from station to station. The data transfer rate ranges from 4 MHz Bits per second to 100 MHz bits per second. Depending on the channel selected for transmission.


Advantages of Ring Topology:

1. It provides for deterministic response and access to the LAN.

2. Often has an extensive fault-tolerant feature to ensure proper operation.

Disadvantages of Ring Topology:

1. It is possible that a failed or powered off MAU may cause the LAN to fail.

2. If the central ring is served, the ring will fail.

Star Topologies:

The Hub is installed in a central wiring closet, with all the cables extending out to the network nodes. The advantage of having a central wiring location is that it's easier to maintain and troubleshoot large networks. All of the network cables come to the central hub. This way, it is especially easy to detect and fix cable problems. You can easily move a workstation in a star topology by changing the connection to the hub at the central wiring closet.

Advantages of Star Topology:

1. Each user has direct access to the shared controller.

2. If a PC workstation fails, the rest of the LAN is unaffected.


3. If a cable is cut or damaged, only the workstation attached to it is cut off from the network.

4. Using media diagnostic tools such as a Time Domain Reflectometer (TDK) is more time consuming and detailed.

Disadvantages of Star Topology:

1. If the shared controller fails, the entire network fails.

2. The number of ports on the controller device limits the total number of PC workstations supported.

3. The more PCs sharing the controller, the slower the aggregate response time.

4. The specialized dedicated controller devices are very expensive.

5. The cabling can be difficult to relocate if a PC is moved another office.

6. Because each PC has its own dedicated cable to the central controller device, the installation can be costly and difficult.

Distributed Star Topology:

The distributed star topology is a hybrid topology. It begins like a linear bus but at interval along the bus a junction box or hub may be attached. From the hub to the workstation it resembles a star type of topology. It is possible to install sub hubs for the purpose of further branching. The distributed star topology is usually combined with the token bus access method. This method allows for a deterministic response to the LAN.

Advantages of Distributed Star Topology:

1. It is usually accompanied by a deterministic access scheme.

2. By using hubs, it is possible to have a large network of cable.

Disadvantages of Star Topology:

1. In order to increase cable or the number of workstations, expensive hubs must be purchased.

2. The more PCs on the LAN, the less time each PC may use the cable.

3. The number of hubs increases the possible number of failure points.

4. It is more time consuming than a linear bus.

5. Each workstation requires its own individual cable.

Tree Topology

Tree topology is the hierarchical bus topology or generalization of bus topology. The node where one or more cables start for branching is called head end, the branches could have more branches for developing complex tree networks. Data travels from every station before reaching the destination.

Bus Topology

Bus network is the most simple and inexpensive of all the networks. A bus has no central controller, and so each network component must be equipped to handle interface problems. The network vendor generally supplies these hardware/software interface elements for specific types of equipments. The data transfer rate is between 1MBPS to 50 MBPS depending on the channel used, with certain limitations.

Advantages of Bus Topology:

1. The linear bus is the most popular topology.

2. It is easy and inexpensive to install.

3. It is very easy to add workstations.

4. It is a very well proven architecture.

5. If a PC fails or is powered down, the LAN is unaffected.

6. A PC booting onto the network has no effect in the LAN.

Disadvantages of Bus Topology:

1. If a piece of the trunk cable is cut or damaged, the entire segment will go down.

Wednesday, December 7, 2011

Get magnificent iPhone4 agreements and blackberry deals web-based

The launch of newest 5th Gen iphone 3gs is approximately the spot and in consequence retaining this aspect mind, numerous retailers are featuring amazing iPhone4 agreements. The iPhone4 contracts have actually managed to get it easy for mid variety to customers procure the handset without any banking limitations. But approving to penetrate a few hire by using a community supplier just means which the end users be required to stick to that exact driver to have a determine length of time.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com

So if yourself don’t have any issues staying with follow for some time, it is indeed a nice alternative for get the best iPhone4 agreements available in the market nowadays. All chief complex stores are supplying reservations special offers thereafter you may use this possibility for your advantage.These agreements for the iPhone4 recommend wonderful style of advantages to mobile phone subscribers. This kind of programs add some fruitful offers and free appeals to call one or two. Apart from having a mobile phone at miserly costs, a number of system operators even recommend free of charge awards like Liquid crystal display TVs, computers and even more.Many bond experiences all of this Apple inc mobile phone have all capabilities like low contacting rate, absolutely free chat both time and mark downs. Thus in any case that you go with Pay and go pact, you may also gain quite a few programs akin to handsets with many absolutely free gifts. These kinds Iphone4 deals are endowed with titanic global popularity available the fact that manufacturer is on the struggle a challenge supply the huge amount of handsets. Markedly the cellular telephone special offers for providing such Apple iPhone4 will continue to be most visited for an extended period of time now. Guys looking forward to get the mobile phone can go by way of on the web agreements and go get the simplest one.Also, the Apple iPhone5 promotions are on offer because the element of deal advertisements. Mentioned above promotions assist the end users to have handsets at no excess charges and 1 may even obtain the possibility to undertake a absolutely free on-line game console, personal computer LCD Television broadcast, DVD and a lot more. Gratis Internet access, business a short period of time and text messages are a handful of one other rewards which could you'll be able to delight in with all the ipHone5 treaty you would like to go with.To possess the finest of agreements on your blackberry., you may require holding a message check on different programs sold by time for them to precious time. Bond contracts can serve as always the best option for you personally as you can get them at low-priced charge. Merely just spend money every month charter during the deal. As majority of the movable producers frequently traffic jam utilizing favorite group users, they're thus qualified to provide splendid handsets like iPhone5 by using pre installed group service and certain approach of other favourable freebies similar to free of charge moments, emails and also the remembrance. If you are being usually the one whom undertakings so incessantly, then it may possibly be best for to opt for a pay as you go iPhone5 treaty respect you are going to to protect a large amount on roving premiums.Linger forget about and obtain the best iPhone4 and blackberry special offers sold at the net.


iPhone4 dealsare very famous in the market these days. You can even opt for upcomingiPhone5 dealsavailable on the net.

Saturday, December 3, 2011

Verizon says it doesn't use Carrier IQ software

Verizon Wireless said Thursday it doesn't add to its phones any software from Carrier IQ, the company that has come under fire in the past few days for what some say amounts to spying on mobile phone users.

MCTS Certification, MCITP Certification

Microsoft HP Exam Training , HP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


Also, Carrier IQ put out another statement clarifying what its software does, in an attempt to calm the uproar, which began when a security researcher published a report showing the software could be used to collect data such as user locations, keys pressed on phones and what applications are running. Phone users typically aren't aware that their phones have the software and they aren't able to turn it off.

Apple, AT&T, Sprint, HTC, Samsung and T-Mobile have said some of their phones use the software. Research In Motion and Nokia have said they don't load the software onto their phones.

On Twitter, Verizon spokesman Jeffrey Nelson wrote on Thursday: "We do not add Carrier IQ to our phones. We do not use other similar software on our devices."

Carrier IQ, meanwhile, continues to assert that it doesn't collect any private information about phone users. In a statement it reiterated that its software does not record, store or transmit the contents of text messages, emails, pictures, audio or video. It captures information such as whether an SMS was delivered and which applications drain the battery, the company said. It "vigorously disagrees" with people who allege that Carrier IQ violates wiretap laws.

On Wednesday, Al Franken, the U.S. senator from Minnesota, sent a letter to Carrier IQ asking it to respond to questions about what kind of personal information it collects about users without their knowledge. He suggested the company might violate privacy laws.

His letter followed Carrier IQ's threat to sue Trevor Eckhart, the researcher whose report kicked off the uproar. Carrier IQ has since withdrawn that threat and apologized for it.

Eckhart reported that Carrier IQ software runs on Verizon phones as well as those from RIM and Nokia. Developers have reported that they have some evidence that shows some Verizon phones run the software. Verizon did not immediately respond to a request for comment about those findings.

Tuesday, November 29, 2011

IBM, HP still server top-dogs, amid sales dip on last year

IBM and HP remain all-but joint partners on Gartner’s third-quarter estimates for 2011, after the two giants took a collective 60 percent of the market.

IBM and HP remain the market leaders in the server business sector, according to latest quarterly figures by analyst Gartner.

MCTS Certification, MCITP Certification

Microsoft HP Exam Training , HP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


The market grew by a touch more than 5 percent to $12.3 billion in revenues, with 2.2 million servers sold.

While worldwide shipments in the third-quarter grew by 7 percent year-on-year, revenue only increased by just over 5 percent year-on-year.

But while Dell grew 6.3 percent from 2010’s third-quarter, Oracle did not grow at all, remaining with a 4.7 percent marketshare, losing an estimated $25 million in revenue.

That said, the third-quarter was strong and the markets can enjoy profits back to nearly how they were before the global financial crisis hit in 2008.

While the markets appear healthy in the U.S. and Canada, predictions about Europe’s markets seemed hedgy at best; a wise decision considering the current turmoil in the European markets, where even the financiers do not know whether the single-market currency, the Euro, will be around this time next year.

IBM attained just shy of 30 percent worldwide server marketshare in the third-quarter, who marginally took the crown from HP with 29.3 percent of the marketshare. But IBM and HP were side-by-side in revenues collected, both accounting for $3.8 billion.

Looking at the figures by-unit, HP sold 694,000 servers, averaging out at a price of $5,500 each, with IBM selling nearly a third of that at 288,000, with an average market price of $13,000.

HP said its sales of industry standard servers — those running regular Intel chips — were down by around 4 percent, while its business critical servers — running Intel’s Itanium chips — were down by nearly a quarter. A significant drop, not helped by the ongoing ding with Oracle, where Oracle had said it would cease support of the Itanium chip because Intel did not plan to keep the platform alive ‘over the long run’.

European antitrust regulators are yet to respond to HP’s calls to investigate Oracle, as the spat reaches the next level.

Dell and Oracle grabbed a 15 percent and 6 percent marketshare respectively in the last quarter.