Question:- You see an unusual activity of the mouse pointer, which starts to move around on its own and clicks on various things on the desktop. What should you do in this situation? A. Call any of the co-workers to seek help B. Disconnect the mouse C. Turn your computer off D. Inform the supervisor E. Disconnect your computer from the network F. Run anti-virus G. Select all the options that apply? Which options would you choose?
Answer:- The answer is (D) and (E). This kind of activity is surely suspicious as an unknown authority seems to have the access to control the computer remotely. In such cases, you should immediately report it to the respective supervisor. You can keep the computer disconnected from the network till help arrives.
Question:- Check out the list of passwords below, which are pulled out from a database: A. Password1 B. @#$)*&^% C. UcSc4Evr! D. akHGksmLN Choose the passwords that are in line with the UCSC’s password requirements.
Answer:- The answer is C (UcSc4Evr!). As per the UCSC requirements, a password should be: Minimum of 8 characters in length Having any of the three from these four types of characters: lower case, upper case, numbers, and special characters.
Question:- The bank sends you an email, which says it has encountered a problem with your account. The email is provided with instructions and also a link to log in to the account so that you can fix it. What do you infer from the above situation? Explain.
Answer:- It appears to be an unsolicited email. You should report it as spam and move the email to the trash immediately in the respective web client you use (Yahoo Mail, Gmail, etc.). Before providing any bank-related credentials online, you should call the bank to check if the message is legitimate and is from the bank.
Question:- In your IT company, employees are registering numerous complaints that the campus computers are delivering Viagra spam. To verify it, you check the reports, and it turns out to be correct. The computer program is automatically sending tons of spam emails without the owner’s knowledge. This happened because a hacker had installed a malicious program into the system. What are the reasons you think might have caused this incident?
Answer:- This type of attack happens when the password is hacked. To avoid this, whenever you set a password, always use a proper standard, i.e., use passwords that are at least 8-character length and have a combination of upper case/lower case letters, symbols/special characters, and numbers. Other scenarios of the above attack could be: 1. Dated antivirus software or the lack of it 2. Dated updates or security patches
Question:- Compare MongoDB with Cassandra.
Answer:- • MongoDB • Document • Read • Multi-indexed • Cassandra • Bigtable like • Write • Using Key or Scan
Question:- What makes MongoDB the best?
Answer:- MongoDB is considered to be the best NoSQL database because of its following features: • Document-oriented (DO) • High performance (HP) • High availability (HA) • Easy scalability • Rich query language
Question:- How to do transactions/locking in MongoDB?
Answer:- MongoDB does not use conventional locking with reduction as it is planned to be light, high-speed, and knowable in its presentation. It can be considered as parallel to the MySQL MyISAM auto entrust sculpt. With the simplest business sustain, performance is enhanced, particularly in a structure with numerous servers.
Question:- When and to what extent does data get extended to multi-slice?
Answer:- MongoDB scrap stands on a collection. So, an album of all substances is kept in a lump or mass. Only when there is an additional time slot, there will be more than a few slice data achievement choices, but when there is more than one lump, data gets extended to a lot of slices and it can be extended to 64 MB.
Question:- Compare MongoDB with Couchbase and CouchbaseDB.
Answer:- Although MongoDB, Couchbase, and Couchbase DB are common in many ways, still they are different in the case of necessities for the execution of the model, crossing points, storage, duplications, etc.
Question:- When do we use a namespace in MongoDB?
Answer:- During the sequencing of the names of the database and the collection, the namespace is used.
Question:- If you remove an object attribute, is it deleted from the database?
Answer:- Yes, it is deleted. Hence, it is better to eliminate the attribute and then save the object again.
Question:- If you remove an object attribute, is it deleted from the database?
Answer:- Yes, it is deleted. Hence, it is better to eliminate the attribute and then save the object again.
Question:- How can we move an old file into the moveChunk directory?
Answer:- Once the functions are done, the old files are converted to backup files and moved to the moveChunk directory at the time of balancing the slices.
Question:- Explain the situation when an index does not fit into RAM.
Answer:- When an index is too huge to fit into RAM, then MongoDB reads the index, which is faster than reading RAM because the indexes easily fit into RAM if the server has got RAM for indexes, along with the remaining set.
