answersLogoWhite

0

📱

Microsoft Windows

Windows is a consumer and enterprise grade family of operating systems developed by Microsoft Corporation. First released in 1985, it has become the best-selling operating system in computer history, and has 90% of the total operating system market.

18,535 Questions

What is the panic button inside the PC?

I dont understand your question

p.s. the escape button

Can you get the clean version for till i collapse on itunes?

no even i looked for 2 hours sorry :(

(adding on to that)

There is a clean album but i haven't bought or listened to till i collapse from that so i wouldn't know if it actually is clean.

Which protocol is used to convert logical IP addresses to physical MAC addresses?

Address Resolution Protocol (ARP)

ARP is primarily used to translate IP Addresses to Ethernet MAC Addresses.

Should I use PowerPoint or word?

If you are making a visual presentation with an overhead projector of some type, use Powerpoint as it handles visuals better than Word. If you are merely presenting a factual document or term paper or the like, use Word.

Why Password Protection is important?

Not every password is safe, and it isn't easy to make them 100% secure.

How do you remove Trojan horse Downloader Dyficia 2 BA?

You need to run these 5 essential steps to remove all the spyware on your computer.

1. Run Deckard's System Scanner (DSS)

2. Run Malwarebytes Anti-Malware

3. Run the anti spyware removal programs spybot

4 Run Superantispyware

5. Run a complete scan with free curing utility Dr.Web CureIt!

Install threat fire which will enhance your antivirus protection

What is replication in active directory and how it is done?

the Active Directory database is replicated between domain controllers. The data replicated between controllers called "data" are also called "naming context". Only the changes are replicated, once a domain controller has been established. Active Directory uses a multimaster model which means changes can be made on any controller and the changes are sent to all other controllers. The replication path in Active Directory forms a ring which adds reliability to the replication.

How Replication is Tracked

* USN - Each object has an Update Sequence Number (USN), and if the object is modified, the USN is incremented. This number is different on each domain controller.

* Stamps - Each object has a stamp with the version number, timestamp, and the GUID of the domain controller where the change was made

Domain controllers each contain a "replica" which is a copy of the domain directory. The "directory update type" indicates how the data is replicated. The two types are:

* Origination update - A change made by an administrator at the local domain controller.

* Replicated update - A change made to the replica because of a replication from a replication partner.

Replication Sequence

Terms:

* Latency - The required time for all updates to be completed throughout all comain controllers on the network domain or forest.

* Convergence - The state at which all domain controllers have the same replica contents of the Active directory database.

* Loose consistency - The state at which all changes to the database are not yet replicated throughout all controllers in the database (not converged).

1. A change is made to the Active Directory database on a domain controller. The attribute of the object and the new USN is written to the database. The entire object is NOT replicated. This is called an atomic operation becuase both changes are done, or neither change is done. This is an origination update. There are four types:

* Add - An object is added to the database.

* Delete - An object is deleted from the database.

* Modify - An object in the database has its attributes modified.

* Modify DN - An object is renamed or moved to another domain.

2. The controller the change was made on (after five minutes of stablilty), notifies its replication partners that a change was made. It sends a change notification to these partners, but only notifies one partner every 30 seconds so it is not overwhelmed with update requests. Each controller, in turn, when it is updated, sends a change notice to its respective replication partners.

3. The replication partners each send an update request with a USN to the domain controller that the change was made on. The USN identifies the current state of the domain controller making the change. Each change has a unique USN. This way the domain controller that has the change knows the state of the domain controller requesting the changes and only the changes are required to be sent. The time on each controller, therefore, does not need to be synchronized exactly although timestamps are used to break ties regarding changes.

4. Changes are made through replication partners until all partners are replicated. At some point, replication partners will attempt to replicate partners that are already updated. This is where propagation dampening is used.

If no changes have been performed in six hours, replication procedures are performed to be sure no information has been missed.

Information sent during an update includes:

* Updated object

* The GUID and USN of the domain server with the originating update.

* A local USN of the update on the updated object.

Replication Path

The replication path that domain controller Active Directory replicated data travels through an enterprise is called the replication topology. Connection objects are used to define the replication paths between domain controllers. Active Directory, by default, sets up a two way ring replication path. The data can travel in both directions around the ring which provides redundancy and reliability. Two types of replication occur in the path:

* Direct replication - When replication is done from a primary source of data.

* Transitive replication - When replication is done from a secondhand or replicated source of data.

The Knowledge Consistency Checker (KCC) (running on all domain controllers) generates the replication topology by specifying what domain controllers will replicate to which other domain controllers in the site. The KCC maintains a list of connections, called a replication topology, to other domain controllers in the site. The KCC ensures that changes to any object are replicated to all site domain controllers and updates go through no more than three connections. Also an administrator can configure connection objects.

The KCC uses information provided by the administrator about sites and subnets to automatically build the Active Directory replication topology.

Propagation Dampening

Terms:

* Propagation dampening is used to prevent unnecessary replication by preventing updates from being sent to servers that are already updated. Each domain controller keeps a list of other known domain controllers and the last USN received from each controller. Two up-to-date vector numbers support this:

o Replica GUID

o Update Sequence Number (USN) - Mentioned earlier it is incremented anytime an origination or replicated update is received. The USN stored is from the originating server. It is stored as metadata with:

+ An attribute indicating "added" or "changed" for the object being updated.

+ The GUID (above).

+ A local USN for the object attribute changed.

+ The changed data.

The up-to-date vector numbers are incremented when replication occurs with the originating server. Each domain controller has its own different USN (They may not start at the same number). The highest USN from each domain controller that is stored in other domain controllers is called the high watermark for that domain controller.

* Propagation delay describes the amount of time required for a change to be replicated to domain controllers throughout the domain.

* Ring Topology - The Active Directory replication process uses a ring topology where the replication partners form a ring. This adds reliability to the process and also helps decrease propagation delay.

The information sent in an update request includes the high water mark entry for the originating server for the last change received. If the highwater mark received from the server that sent the update request is the same as the highwatermark for the originating server on the server receiving the request, the receiving server will not send the replicated information.

The usnChanged parameter is the highest USN number for any object.

Replication Partitions

Types of Active Directory data storage categories which are called partitions:

* Schema partition - Defines rules for object creation and modification for all objects in the forest. Replicated to all domain controllers in the forest. Replicated to all domain controllers in the forest, it is known as an enterprise partition.

* Configuration partition - Information about the forest directory structure is defined including trees, domains, domain trust relationships, and sites (TCP/IP subnet group). Replicated to all domain controllers in the forest, it is known as an enterprise partition.

* Domain partition - Has complete information about all domain objects (Objects that are part of the domain including OUs, groups, users and others). Replicated only to domain controllers in the same domain.

o Partial domain directory partition - Has a list of all objects in the directory with a partial list of attributes for each object.

These partitions are all replicated between domain controllers by Active directory. Different partitions may be replicated between different replication partners.

Replication Conflict

Replication conflict occurs when changes are made to the same object and attribute before the changes can be replicated throughout all domain controller's copies of the database. Additional data (metadata) stored for each object attribute includes (not related to USN):

* Time stamp of the last change.

* Attribute version number - For each object's attributes, this value is the same on all domain controllers.

When an Active Directory database update is received on a domain controller, one of the following happens:

* If the update attribute version number is higher than the current version number on the controller, the new value of the attribute is stored and the version number is updated.

* If the update attribute version number and stored attribute version number are the same, timestamps are used to resolve the conflict.

* If the both version numbers and both timestamps are the same, the update from the controller with the highest GUID is used.

File Replication Service

In Windows 2000, the SYSVOL share is used to to authenticate users. The SYSVOL share includes group policy information which is replicated to all local domain controllers. File replication service (FRS) is used to replicate the SYSVOL share. The "Active Directory Users and Computers" tool is used to change the file replication service schedule.

Intrasite Replication

Replication that happens between controllers inside one site. All of the subnets inside the site should be connected by high speed network wires. Replication between two sites may need to be sent over a slower WAN link or leased line. Intrasite replication data is sent uncompressed.

Site replication is done using Remote Procedure Call (RPC). If a change is made, replication occurs within five minutes, and replication is done every six hours if no changes were made. Domain controllers that receive updates replicate that information to other domain controllers on their route list. All changes are therefore completed within a site within 15 minutes since there can only be three hops.

The topology used here is the ring topology talked about earlier and this replication is automatically set up by Active Directory, but may be modified by an administrator.

DNS Replication

The DNS IP address and computer name is stored in Active Directory for Active Directory integrated DNS zones and replicated to all local domain controllers. DNS information is not replicated to domain controllers outside the domain.

Intersite Replication

Intrasite replication is replication between sites and must be set up by an administrator.

Replication Management

The administrative tool, "Active Directory Sites and Services", is used to manage Active Directory replication. Replication data is compressed before being sent to minimze bandwidth use. There are two protocols used to replicate AD:

* Normally Remote Procedure Call (RPC) is used to replicate data and is always used for intrasite replication since it is required to support the FRS. RPC depends on IP (internet protocol) for transport.

* Simple Mail Transfer Protocol (SMTP) may be used for replication between sites.

SMTP can't replicate the domain partition, however. Therefore the remote site would need to be in another domain to be able to effectively use SMTP for carrying replication data.

Bridgehead server - A domain controller that is used to send replication information to one or more other sites.

Flexible Single Master Operations (FSMO) (discussed in an earlier section) can be transferred manually to various domain controllers. Roles and tools used to transfer are:

* Schema Master - Use "Active Directory Domains and Trusts". Makes changes to the database schema. Applications may remotely connect to the schema master.

* Domain Naming Master - Use the MMC "Active Directory Schema Snap-in". Adds or removes domains to or from the forest.

* Primary Domain Controller (PDC) Emulator - Use the "Active Directory Users and Computers" administrative tool. When Active Directory is in mixed mode, the computer Active Directory is on acts as a Windows NT PDC. Mixed mode occurs when Active Directory interfaces with NT 4.0 BDCs or ones without Windows 2000 Directory Service client software. In mixed mode, computers without Windows 2000 client software must contact the PDC emulator to change user account information.

* Relative ID Master (RID Master) - Use the "Active Directory Users and Computers" administrative tool. All objects have a Security Identifier (SID) and a domain SID. The RID assigns relative IDs to each domain controller.

* Infrastructure Master - Use the "Active Directory Users and Computers" administrative tool. Updates group membership information when users from other domains are moved or renamed.

Any master role can be transferred by using the command line program, ntdsutil.exe. When a server performing a master role fails and goes offline, you can perform "seizing master operations" to have another server perform that role. Only the ntdsutil.exe program can perform this function. Commands include:

* connections - A connections prompt appears:

o connect to server "FQDN of server to connect to"

o quit

* sieze "name of role to transfer". Role names are:

o PDC

o RID master

o schema master

o domain naming master

o infastructure master

Example: "sieze RID master"

Replication Associated Performance Monitor Counters

* DRA Inbound Bytes Not Compressed - Replicated uncompressed bytes that are probably from a Directory Services Agent (another controller sending data) in the same site.

* DRA Inbound Bytes Compressed (Before Compression) - Replicated bytes received (as though in uncompressed form).

* DRA Inbound Bytes Not Compressed (After Compression) - Replicated bytes received (as in compressed form).

* DRA Inbound Bytes Total The sum of the DRA Inbound Bytes Not Compressed plus the DRA Inbound Bytes Not Compressed (After Compression).

* DRA Outbound Bytes Not Compressed - Replicated uncompressed bytes that are being sent to another domain controller in the same site.

Schema Cache

A schema cache which is a copy of the schema in memory can be used to speed up schema queries but should be used sparingly due to the high memory requirements. If the schemaUpdateNow attribute is added to the RootDSE a schema cache update is done immediately. Normally the schema cache is stored in memory when the system boots and updated every five minutes.

Where is logging happening?

Logging is happening in the world because people need the trees for wood how ever it is destroying the rainforest. But if we stopped we would have no wood and so this is a win win situation i love that phrase loll.

What is the maximum amount of memory the banks on your motherboard can accommodate motherboard 210882?

It depends on the motherboard. If you can find out what type of motherboard you have, you can look up what type of memory and how much of it you can install into the memory banks. Keep in mind that the operating system that you have may limit how much of the installed memory you can actually use.

What deadlock strategy is used in windows xpunixlinux operating systems?

There was, at one time, a one word answer to this question and that answer was:

ostrich

Referring to the ostrich algorithm I believe, meaning to stick one's head in the sand rather than deal with a particularly complex and bedeviling problem. In reality, there are strategies for handling deadlocks. This topic is very complexand generally not for the novice developer.

One good paper on this topic was written by Tong Li, Carla S. Ellis, Alvin R. Lebeck and Daniel J. Sorin (Department of Computer Science, Department of Electrical and Computer Engineering, Duke University) and presented at the 2005 USENIX Annual Technical Conference in Anaheim, California.

Their paper may be found here:

http://people.ee.duke.edu/~sorin/papers/usenix05_deadlock.pdf

In practice, depending on the application, the problem may be so rare as to be hardly worth the often considerable time and effort required to construct a handler for those rare exceptions.

Anecdotally, I have encountered deadlock situations several times in the last 25 years, usually while writing applications using named pipes (FIFO), in each case I devised my own solution designed to suit the particular situation encountered. By no means a panacea, nor do I recommend this technique.

May I suggest the author of the question consider devising a universal solution for the rest of us... A general purpose, all weather solution would certainly be appreciated. :)

What is some information about Microsoft Windows Installer?

The windows installer (previously known as Microsoft Installer) is a software component used for the installation, maintenance, and removal of software on modern Microsoft windows systems. The installation information and often the files themselves, are packaged in installation packages, loosely relational databases structured as COM structured Storages and commonly known as MSI files from their default file extension.

How can you recover lost username and password?

go to a site which know sbout to recover username and password

Why is task-switching a necessary feature of a multitasking?

The 80386 switches execution to another task in any of four cases: 1. The current task executes a JMP or CALL that refers to a TSS

descriptor.

2. The current task executes a JMP or CALL that refers to a task gate.

3. An interrupt or exception vectors to a task gate in the IDT.

4. The current task executes an IRET when the NT flag is set.

JMP, CALL, IRET, interrupts, and exceptions are all ordinary mechanisms of the 80386 that can be used in circumstances that do not require a task switch. Either the type of descriptor referenced or the NT (nested task) bit in the flag word distinguishes between the standard mechanism and the variant that causes a task switch.

To cause a task switch, a JMP or CALL instruction can refer either to a TSS descriptor or to a task gate. The effect is the same in either case: the 80386 switches to the indicated task.

An exception or interrupt causes a task switch when it vectors to a task gate in the IDT. If it vectors to an interrupt or trap gate in the IDT, a task switch does not occur. Refer to Chapter 9 for more information on the interrupt mechanism.

Whether invoked as a task or as a procedure of the interrupted task, an interrupt handler always returns control to the interrupted procedure in the interrupted task. If the NT flag is set, however, the handler is an interrupt task, and the IRET switches back to the interrupted task.

A task switching operation involves these steps:

  1. Checking that the current task is allowed to switch to the designated task. Data-access privilege rules apply in the case of JMP or CALL instructions. The DPL of the TSS descriptor or task gate must be less than or equal to the maximum of CPL and the RPL of the gate selector. Exceptions, interrupts, and IRETs are permitted to switch tasks regardless of the DPL of the target task gate or TSS descriptor.
  2. Checking that the TSS descriptor of the new task is marked present and has a valid limit. Any errors up to this point occur in the context of the outgoing task. Errors are restartable and can be handled in a way that is transparent to applications procedures.
  3. Saving the state of the current task. The processor finds the base address of the current TSS cached in the task register. It copies the registers into the current TSS (EAX, ECX, EDX, EBX, ESP, EBP, ESI, EDI, ES, CS, SS, DS, FS, GS, and the flag register). The EIP field of the TSS points to the instruction after the one that caused the task switch.
  4. Loading the task register with the selector of the incoming task's TSS descriptor, marking the incoming task's TSS descriptor as busy, and setting the TS (task switched) bit of the MSW. The selector is either the operand of a control transfer instruction or is taken from a task gate.
  5. Loading the incoming task's state from its TSS and resuming execution. The registers loaded are the LDT register; the flag register; the general registers EIP, EAX, ECX, EDX, EBX, ESP, EBP, ESI, EDI; the segment registers ES, CS, SS, DS, FS, and GS; and PDBR. Any errors detected in this step occur in the context of the incoming task. To an exception handler, it appears that the first instruction of the new task has not yet executed.

Note that the state of the outgoing task is always saved when a task switch occurs. If execution of that task is resumed, it starts after the instruction that caused the task switch. The registers are restored to the values they held when the task stopped executing.

Every task switch sets the TS (task switched) bit in the MSW (machine status word). The TS flag is useful to systems software when a coprocessor (such as a numerics coprocessor) is present. The TS bit signals that the context of the coprocessor may not correspond to the current 80386 task. Chapter 11 discusses the TS bit and coprocessors in more detail.

Exception handlers that field task-switch exceptions in the incoming task (exceptions due to tests 4 thru 16 of Table 7-1) should be cautious about taking any action that might load the selector that caused the exception. Such an action will probably cause another exception, unless the exception handler first examines the selector and fixes any potential problem.

The privilege level at which execution resumes in the incoming task is neither restricted nor affected by the privilege level at which the outgoing task was executing. Because the tasks are isolated by their separate address spaces and TSSs and because privilege rules can be used to prevent improper access to a TSS, no privilege rules are needed to constrain the relation between the CPLs of the tasks. The new task begins executing at the privilege level indicated by the RPL of the CS selector value that is loaded from the TSS.

What is the shortcut to type a peace symbol?

You can copy and paste the symbol itself into the Display Name and it will show up.

You can do a Google search for "special characters" or "myspace symbols" to find more characters. Most have an HTML character code (or some people use alt codes to enter), but due to some Myspace limitation, not all of these will function. Your best bet is to simply copy and paste the symbol for it to work on Myspace.

What generates a Non-System Disk or Disk Error?

While booting, a computer looks at a number of available disks (floppies, CDs, harddisks) to see if they contain a bootable operating system. Older PCs would always boot from the harddisk, unless a floppy was present, and if that floppy didn't contain an operating system (like DOS), it would give this error message so you could remove the floppy and the computer could go on booting from the harddisk.

What is touch screen called in computer terminology?

It's often simply called a touch screen or a multi touch screen. Invented by Jeffery Han. There are several different technologies that do this. It is based on blob detection. Fingertips cause an electromagnetic or other signal.

How do you convert CD's to mp3 format?

open up windows media player and insert the CD. then look to the top right hand corner of the windows click on 'rip' the choose the songs you want copied from the CD and click start. (Rip isn't what is sounds like, your cd wont be damaged

If you restore your ipod will it delete your applications?

when you restore an ipod it doesn't delete your songs or apps but it will delete your high scores from the last time you sync your ipod.

HOW to make a cover page on Microsoft Word 2003?

your computer is to old for that and u need to get a new updated microsoft word