answersLogoWhite

0

Windows Server 2003

Also known as the Win2K3, Windows Server 2003 is a server OS (operating system) from the American software company Microsoft. This OS has the capability to share printers and files, provide email services, authenticate users, and host message queues.

1,215 Questions

What is equivalence partitioning?

Answer
A technique in black box testing is equivalence partitioning. Equivalence partitioning is designed to minimize the number of test cases by dividing tests in such a way that the system is expected to act the same way for all tests of each equivalence partition. Test inputs would be selected from each partition.

Grocery Store Example
Consider a software module that is intended to accept the name of a grocery item and a list of the different sizes the item comes in, specified in ounces. The specifications state that the item name is to be alphabetic characters 2 to 15 characters in length. Each size may be a value in the range of 1 to 48, whole numbers only. The sizes are to be entered in ascending order (smaller sizes first). A maximum of five sizes may be entered for each item. The item name is to be entered first, followed by a comma, then followed by a list of sizes. A comma will be used to separate each size. Spaces (blanks) are to be ignored anywhere in the input.

Derived Equivalence Classes
  1. Item name is alphabetic (valid)
  2. Item name is not alphabetic (invalid)
  3. Item name is less than 2 characters in length (invalid)
  4. Item name is 2 to 15 characters in length (valid)
  5. Item name is greater than 15 characters in length (invalid)
  6. Size value is less than 1 (invalid)
  7. Size value is in the range 1 to 48 (valid)
  8. Size value is greater than 48 (invalid)
  9. Size value is a whole number (valid)
  10. Size value is a decimal (invalid)
  11. Size value is numeric (valid)
  12. Size value includes nonnumeric characters (invalid)
  13. Size values entered in ascending order (valid)
  14. Size values entered in nonascending order (invalid)
  15. No size values entered (invalid)
  16. One to five size values entered (valid)
  17. More than five sizes entered (invalid)
  18. Item name is first (valid)
  19. Item name is not first (invalid)
  20. A single comma separates each entry in list (valid)
  21. A comma does not separate two or more entries in the list (invalid)
  22. The entry contains no blanks (???)
  23. The entry contains blanks (????)
Black Box Test Cases for the Grocery Item Example based on the Equivalence Classes Above.

*Source: http://users.csc.calpoly.edu/~jdalbey/205/Resources/grocerystore.html

How do you Reset Local computer Policy to Default?

secedit /configure /cfg %windir%\repair\secsetup.inf /db secsetup.sdb /verbose

What objects have been created in this container automatically by the Active Directory Domain Services Installation Wizard?

The container in this question is "Users" theObjectsare inside the Container.
They are as follows:
Administrator, Allowed RODC Password Replication Group, Cert Publishers, Denied RODC Password Replication Group,, DnsAdmins, DnsUpdateProxy, Domain Admins, Domain Computers, Domain Controllers, Domain Guests, Domain Users, Enterprise Admins, Enterprise Read-only Domain Controllers, Group Policy Creator Owners, Guest, RAS and IAS Servers, read-only Domain Controllers, Schema Admins (either Student99 or your ITT Student number)

What is role in active directory?

The role refers to the service or services that the server is providing, such as DHCP, DNS, HTTP, etc.

In a domain installations of DHCP require the authorization of the dhcp server before IP addresses can be allocated True or False?

yes DHCP require the authorization of the dhcp server before IP addresses can be allocated because until we authorize DHCP server the network does not know who is the dhcp server for the subnet. The DHCP server broadcasts the information to all.

What are akamaighost servers?

AkamaiGhost is basically a Web Server found on Linux Systems. The concept behind AkamaiGhost is to Cache Websites on different Geographcal locations to provide better /fast access and reduce load on core servers. At bottom line its just a server that mirrors data to deliver that to requesting ISP from a closer location.

How do you configure Windows NT RAS Server to Windows 2000 Ras Server?

Add the RRAS computer to the appropriate group:

1. Log on to your computer with an account that has administrator privileges on the Windows 2000 domain.

2. Launch the Active Directory Users and Computers MMC snap-in, and then double-click the domain name.

3. Double-click the Users folder, and then double-click the RAS and IAS Servers security group.

4. Select the members tab.

5. Add the RRAS server to this group.

If the organization has more than one domain in the forest, and users from the different domains are trying to log on to the RRAS server, continue to follow steps 1 through 5 until the RRAS server is in the "RAS and IAS Servers" security group for each respective domain.

Use the Netsh.exe Utility

The Netsh.exe methods can only be used if the RRAS server is Windows 2000-based.

Use either of the following methods with the Netsh.exe tool:

1

Log on the RRAS computer using an account that has domain administrator privileges, type netsh ras add registered server at a command prompt, and then press ENTER.

2

To run a command with administrator privileges without being logged in as an administrator:

1. At a command prompt on the RRAS computer, type runas /user:domain name\administrator name "cmd", where domain name is the appropriate domain name, and administrator name is the appropriate administrator name. You are then prompted to enter a password for this account. If this computer is able to connect to the domain controller and verify the credentials, a command prompt opens with the following information in the title bar:

cmd (running as domain name\administrator name)

2. At a command prompt, type netsh ras add registeredserver at a command prompt, and then press ENTER.

Cannot open word files MSG is the command cannot be performed because a dialog box is open click OK and then close open dialog boxes to continue?

AMDG+JMJ

I found this info on some other sites. The problem is with Norton Anti Virus (not Norton Internet Security). If you disable the MS Office plugin option it fixes the problem.

Here's a link that shows how to do it.

http://pubs.logicalexpressions.com/Pub0009/LPMArticle.asp?ID=109

If the above didn't help or not applicable, user profile could be corrupted in some way.

To fix it, try logging as the local admin or another user with admin level rights. Then hide the profile in question located in 'C:\Documents and Settings\' by renaming it. I usually add "OLD_" before the original profile name to make it recognizable while renaming it differently.

Afterwards, have that user login again which would re-create the user profile. After the profile was re-created files and settings could be transferred.

This problem also happens when you do not even have Norton Anti Virus installed on your computer. It is due to a Corrupt file. To fix - completely uninstall Microsoft Office then reinstall. You must uninstall Office first then do a complete reinstallation. Doing a repair does not fix it.

How can configure RIS Server 2008?

In windows 2008 you can install 7 configure WDS not RIS support.

What major tasks are required to create an Active Directory site in Windows Server 2008?

Prepare your infrastructure with the right IP addresses and subnets, configure a new subnet and site on the active directory sites and services

What is computer connected to a server?

A computer that is connected to a server is known as either a client or a terminal depending on what the end computer is capable of accomplishing without connection to the server.

What is the Windows Server 2008 default limit for the number of simultaneous users is set to?

In Windows Server 2008, the default limit is 16,777,216, which is, practically speaking, unlimited. In Windows Vista, the maximum number of users who can access a share is 10.

Which permission will you grant a user for a folder he need to be able to create and delete files in if you do not want him to be able to change permissions for the folder?

Write,

Access control lists are used to specify the permissions that users will have to resources on the network. The Write permission allows a user to modify folders and files that already exist in the environment as well as create new files and folders as required.

Difference between active site and binding site?

Binding site is anywhere which something (such as a protein) can bind to. An example would be the upper flanking regions which contain binding sites thattranscription factors bond with during transcription.

The active site is more specific to enzymes and refers to the site where the enzyme functions. It is the specific contours of this active site which give the enzyme its specific function (see how enzymes are substrate specific).

How do you apply group policy on an OU?

Firstly download the Microsoft Group Policy Management Console from Microsoft. Expand your domain, right click on an OU, select "Create and Link GPO Here ..." to create a new GPO and link it, or "Link an Existing GPO" and select an already created GPO.

What is the purpose of volume pricing?

When a company uses a volume-pricing objective, it is seeking sales maximization within predetermined profit guidelines. A company using this objective prices a product lower than normal but expects to make up the difference with a higher sales volume.

Which circumstances are APIPA addresses assigned?

According to Microsoft:

How to use automatic TCP/IP addressing without a DHCP server

"A Windows-based computer that is configured to use DHCP can automatically assign itself an Internet Protocol (IP) address if a DHCP server is not available. For example, this could occur on a network without a DHCP server, or on a network if a DHCP server is temporarily down for maintenance."

For more information, see Related Links, below.

What Active Directory object is used to divide network users into manageable categories?

Do you Mean so you can divide users into seperate groups, say in a business environment you could divide marketing from human resources?

Trending Questions
Can you run Terminal Services RemoteApp on server 2003? What group has the right to create shared folders within a domain? What are the different types of web server? What best describes clustering? Shortcut for active directory sites and service command? What type of update allows client computers to register and update their resource records with a DNS server whenever changes occur? Can you install exchange 2007 on Ad server? What information is provided by the green pages of the ERG? What is the difference between Copy Xcopy and diskcopy? What tire pressure for ford fiesta finesse 1.1? What factors account the success and popularity of TCP IP? How many types of neurosyphilis are there? What domain does The U.S. continues to become more dependent on the global domain witling the information environment consisting of the interdependent network of information technology infrastructures? What is the default period of time after which a dhcp client attempts to RENEW ITS IP? What processes can be used by windows server 2008 dns to clean up the dns database after dns records become stale or out of date? The Enforce setting on a GPO overrides which GPO control measure? Which is the command used to remove active directory from a domain controller? Which audit category includes events such as server startup and shutdown time changes and clearing he security log within the windows event viewer? What active directory domain services are not installed on a Windows server 2008 computer until you install AD DS role to the computer? What is used to manage the licensing process for volume licenses of windows vista and windows server 2008?