Explain the purpose of command-line application, Operating System

Assignment Help:

Question:

a) The following questions refers to Windows XP networking:

i) Briefly, explain how a host joins a network using DHCP?
ii) Which IP address could be assigned to a DHCP host if the DHCP server is currently down and no alternate configuration has been given?

iii) Give one advantage of assigning DNS servers dynamically rather than statically?

iv) Explain the purpose of the following command-line applications:

a. Ipconfig
b. Ping
c. tracert

b) John and Michael work in the same office and both use Windows XP Professional as client OS. Currently, Michael is on holidays and has given his username and password to John. John logs on Michael machine everyday at the office since he sometimes require files and applications found on Michael's PC. John is known to be extremely lazy, he wants to access Michael's Desktop without moving from his chair.

Explain carefully how John can be the only one to connect remotely to Michael's PC?

 


Related Discussions:- Explain the purpose of command-line application

Paging, Paging full question

Paging full question

Online Q & A System, It uses unix commands such as forks and pipe .I need s...

It uses unix commands such as forks and pipe .I need solution to this project

What happens when you execute a program in unix, When you run a program on ...

When you run a program on your UNIX system, the system prepares a special environment for that program. This environment owns everything needed for the system to execute the progra

What is a message passing system, Question 1 What is a message passing sys...

Question 1 What is a message passing system? Discuss the desirable features of a message passing system Question 2 Discuss the implementation of RPC Mechanism in detail Q

What is the translation look aside buffer (tlb), Translation Look aside Buf...

Translation Look aside Buffer In a cached system, the base addresses of the last few indexed pages is maintained in registers named the TLB that adds in faster lookup. TLB has

How are file sharing and protection implemented?, How are file sharing and ...

How are file sharing and protection implemented? To implement file protection and sharing, the system ought to maintain more file and directory attributes than are needed on a

Explain quick fit algorithams, QUICK FIT ALGORITHAMS Here we keep apart...

QUICK FIT ALGORITHAMS Here we keep apart lists for holes and processes. Therefore this reduces the searching time for holes Hole list and Process list. If we organize the li

Prepare a short note on the standard linux file system, Problem: a) Pre...

Problem: a) Prepare a short note on the standard Linux File System. b) Prepare a short note on the RPM Package Management Tool. c) Briefly explain the two types of login

Which are the different states of a process, Which are the different states...

Which are the different states of a process?   Different status of a process is: New: When the process is created. Running: When instructions are executed. Wait

Protection scheme in unix, Q. Consider a system that holds 5000 users. Pre...

Q. Consider a system that holds 5000 users. Presume that you want to allow 4990 of these users to be able to access one file. a. How would you denote this protection scheme in

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd