Explain the purpose of command-line application, Operating System

Assignment Help:

Question:

a) The following questions refers to Windows XP networking:

i) Briefly, explain how a host joins a network using DHCP?
ii) Which IP address could be assigned to a DHCP host if the DHCP server is currently down and no alternate configuration has been given?

iii) Give one advantage of assigning DNS servers dynamically rather than statically?

iv) Explain the purpose of the following command-line applications:

a. Ipconfig
b. Ping
c. tracert

b) John and Michael work in the same office and both use Windows XP Professional as client OS. Currently, Michael is on holidays and has given his username and password to John. John logs on Michael machine everyday at the office since he sometimes require files and applications found on Michael's PC. John is known to be extremely lazy, he wants to access Michael's Desktop without moving from his chair.

Explain carefully how John can be the only one to connect remotely to Michael's PC?

 


Related Discussions:- Explain the purpose of command-line application

How the nested macro calls are expanded, How the Nested Macro calls are exp...

How the Nested Macro calls are expanded LIFO (Last in First out)

What disadvantages are there to this two-level directory, What disadvantage...

What disadvantages are there to this two-level directory? Without other provisions, two users who require cooperating with each other are hampered in reaching every other's fi

Information system can be divided into three task areas, From hardware pers...

From hardware perspective, every information system can be divided into three task areas Presentation, Application Logic and Data Storage. The R/3 Basis software is extremely s

Define analysis for syntactic structure of source statement, An analysis, w...

An analysis, which defines the syntactic structure of the source statement, is known as Syntax analysis defines the syntactic structure of the source statement

Diehard allocator - custom allocators, Allocators can also be used to avoid...

Allocators can also be used to avoid problems with unsafe languages. C and C++ are pervasive, with huge amounts of existing code. They are also memory-unsafe languages, in that the

Drawbacks of least-recently used algorithm, The question of fairness, regar...

The question of fairness, regarding page eviction, is a hard one. How do we decide what is fair? Many operating systems use global LRU, where pages from all processes are managed t

Network operating system and a distributed operating system, Problem: (...

Problem: (a) (i) Explain what a single system image is and how it is related to the concept of a distributed operating system? (ii) What are the main differences between a

What circumstances is a token-passing network more effectual, Q. In what ci...

Q. In what circumstances is a token-passing network more effectual than an Ethernet network? Answer: A token ring is extremely effective under high sustained load as no colli

Mutual exclusion, With software algorithms for mutual exclusion, such as De...

With software algorithms for mutual exclusion, such as Dekker's algorithm, Peterson's algorithm, or Lamport's bakery algorithm, note that optimizing compilers and out-of-order exec

Process creation, what is process creation and how to create a process

what is process creation and how to create a process

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd