Edited, memorised or added to reading queue

on 06-Aug-2019 (Tue)

Do you want BuboFlash to help you learning these things? Click here to log in or create user.

A computer system can be divided roughly into four components: the hardware, the operating system, the application programs, and the users
statusnot read reprioritisations
last reprioritisation on suggested re-reading day
started reading on finished reading on

pdf

cannot see any pdfs




We can also view a computer system as consisting of hardware, software, and data. The operating system provides the means for proper use of these resources in the operation of the computer system. An operating system is similar to a government. Like a government, it performs no useful function by itself. It simply provides an environment within which other programs can do useful work.
statusnot read reprioritisations
last reprioritisation on suggested re-reading day
started reading on finished reading on

pdf

cannot see any pdfs




The user’s view of the computer varies according to the interface being used. Most computer users sit in front of a PC,consistingofamonitor, keyboard, mouse, and system unit. Such a system is designed for one user
statusnot read reprioritisations
last reprioritisation on suggested re-reading day
started reading on finished reading on

pdf

cannot see any pdfs




to monopolize its resources. The goal is to maximize the work (or play) that the user is performing. In this case, the operating system is designed mostly for ease of use, with some attention paid to performance and none paid to resource utilization—how various hardware and software resources are shared. Performance is, of course, important to the user; but such systems are optimized for the single-user experience rather than the requirements of multiple users. In other cases, a user sits at a terminal connected to a mainframe or a minicomputer. Other users are accessing the same computer through other terminals. These users share resources and may exchange information. The operating system in such cases is designed to maximize resource utilization— to assure that all available CPU time, memory, and I/O are used efficiently and that no individual user takes more than her fair share. In still other cases, users sit at workstations connected to networks of other workstations and servers. These users have dedicated resources at their disposal, but they also share resources such as networking and servers, including file, compute, and print servers. Therefore, their operating system is designed to compromise between individual usability and resource utilization. Recently, many varieties of mobile computers, such as smartphones and tablets, have come into fashion. Most mobile computers are standalone units for individual users. Quite often, they are connected to networks through cellular or other wireless technologies. Increasingly, these mobile devices are replacing desktop and laptop computers for people who are primarily interested in using computers for e-mail and web browsing. The user interface for mobile computers generally features a touch screen, where the user interacts with the system by pressing and swiping fingers across the screen rather than using a physical keyboard and mouse. Some computers have little or no user view. For example, embedded computers in home devices and automobiles may have numeric keypads and may turn indicator lights on or off to show status, but they and their operating systems are designed primarily to run without user intervention.
statusnot read reprioritisations
last reprioritisation on suggested re-reading day
started reading on finished reading on

pdf

cannot see any pdfs




Flashcard 3823593721100

Question
In linux, when you install a native C program from source, you obtain the zipped up (tarred up) source files, unpack it, and then use the [...] command to do the build/install from source.
Answer
make

statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill
24. Source and Binary Packages
y whom, and on what date. Used to track work on the package. Being GNU standards compliant should also mean that the package can be installed with only the three following commands: ./configure <span>make make install It also usually means that packages will compile on any UNIX system. Hence, this section should be a good guide to getting LINUX software to work on non-LINUX machines. An







Flashcard 4306407394572

Question
How to move the VM Storage of "Test VM" to the Storage Target D:\TestVM with Powershell ?
Answer
PS C:\> Move-VMStorage "Test VM" -DestinationStoragePath D:\TestVM

statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill
Move-VMStorage
eUnmanagedVhds] [-AllowUnverifiedPaths] [-AsJob] [-WhatIf] [-Confirm] [<CommonParameters>] Description The Move-VMStorage cmdlet moves the storage of a virtual machine. Examples Example 1 <span>PS C:\> Move-VMStorage "Test VM" -DestinationStoragePath D:\TestVM Moves all files associated with a virtual machine test VM to D:\TestVM Example 2 PS C:\> Move-VMStorage "Test VM" -VirtualMachinePath D:\TestVM\Config -SnapshotFilePath D:\TestVM\Sna







Flashcard 4306409753868

Question
How to moves all files associated with a virtual machine test VM to different locations under D:\TestVM ?
Answer

PS C:\> Move-VMStorage "Test VM"

-VirtualMachinePath D:\TestVM\Config

-SnapshotFilePath D:\TestVM\Snapshots

-SmartPagingFilePath D:\TestVM\SmartPaging

-VHDs @(@{"SourceFilePath" = "C:\TestVM\Disk1.VHDX";

"DestinationFilePath" = "D:\TestVM\Disks\Disk1.VHDX"},

@{"SourceFilePath" = "C:\TestVM\Disk2.VHDX";

"DestinationFilePath" = "D:\TestVM\Disks\Disk2.VHDX"})


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill
Move-VMStorage
e of a virtual machine. Examples Example 1 PS C:\> Move-VMStorage "Test VM" -DestinationStoragePath D:\TestVM Moves all files associated with a virtual machine test VM to D:\TestVM Example 2 <span>PS C:\> Move-VMStorage "Test VM" -VirtualMachinePath D:\TestVM\Config -SnapshotFilePath D:\TestVM\Snapshots -SmartPagingFilePath D:\TestVM\SmartPaging -VHDs @(@{"SourceFilePath" = "C:\TestVM\Disk1.VHDX"; "DestinationFilePath" = "D:\TestVM\Disks\Disk1.VHDX"}, @{"SourceFilePath" = "C:\TestVM\Disk2.VHDX"; "DestinationFilePath" = "D:\TestVM\Disks\Disk2.VHDX"}) Moves all files associated with a virtual machine test VM to different locations under D:\TestVM. Required Parameters -DestinationStoragePath Specifies a destination storage path to whi







Flashcard 4306415521036

Question
How to enable nested virtualization on host ?
Answer
Set-VMProcessor -VMName <VMName> -ExposeVirtualizationExtensions $true

statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill
Nested Virtualization | Microsoft Docs
e required OS and VM versions. While the virtual machine is in the OFF state, run the following command on the physical Hyper-V host. This enables nested virtualization for the virtual machine. <span>Set-VMProcessor -VMName <VMName> -ExposeVirtualizationExtensions $true Start the virtual machine. Install Hyper-V within the virtual machine, just like you would for a physical server. For more information on installing Hyper-V see, Install Hyper-V . Disab







Flashcard 4306417880332

Question
How to turn on MacAdressSpoofing for routing network packets through two virtual switches ?
Answer

MAC Address Spoofing

In order for network packets to be routed through two virtual switches, MAC address spoofing must be enabled on the first (L1) level of virtual switch. This is completed with the following PowerShell command.

Get-VMNetworkAdapter -VMName <VMName> | Set-VMNetworkAdapter -MacAddressSpoofing On

statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill
Nested Virtualization | Microsoft Docs
ze. The incompatibility only occurs while Hyper-V is running in the VM. Networking Options There are two options for networking with nested virtual machines: MAC address spoofing NAT networking <span>MAC Address Spoofing In order for network packets to be routed through two virtual switches, MAC address spoofing must be enabled on the first (L1) level of virtual switch. This is completed with the following PowerShell command. Get-VMNetworkAdapter -VMName <VMName> | Set-VMNetworkAdapter -MacAddressSpoofing On Network Address Translation (NAT) The second option relies on network address translation (NAT). This approach is best suited for cases where MAC address spoofing is not possible, like