Sie sind auf Seite 1von 10

Technical Comprehension

question
Statemen
t passage
answ
erA
answer
B answerC
answ
erD
ans
wer
E
What does
Ksplice do?
When a Linux kernel updates, a
reboot is required to apply the
changes as you have to boot
with the new kernel eatures!
"nd in cases when the system
happens to be a server,
rebooting becomes painul as it
contributes to the downtime o
the system! "gain when you
have customer #L"s where you
have to stick to $ nines or %
nines, this small little upgrade
can cause you ace
tremendous pressure! "t the
same time security updates or
even or that matter any kernel
update is not something you
can a&ord to
ignore!'(br)Ksplice converts
the updates into hot updates
which are prepared at ob*ect
code level instead o source
code level, thus minimi+ing
programmer,s involvement!
-xisting practices o updating
Kernel rely on programmer
writing a source code .les or
changing certain properties or
require a manual inspection o
running binaries to ensure
saety guarantees! Ksplice,
however, updates the legacy
binaries based on existing
inormation /a source code
patch0 and so it doesn,t require
a system reboot!'(br)Ksplice
replaces the whole unction i
any part o the code in the
unction is to be modi.ed by
applying patch! 1t links the
unction to its newer
replacement code into the
Kernel by placing a *ump
instruction which redirects the
path to replacement code! "lso
ksplice while applying an
update the system disrupts or
2!% milliseconds3 however no
network connections or any
open application is a&ected! "
small amount o memory is
used in storing replacement
Ksplic
e does
away
with
the
need
to
updat
e the
kernel
Ksplice
is used
to
change
the
source
code o
the
kernel
Ksplice
allows to
update
the kernel
without
rebooting
the
system
Ksplic
e
replac
es the
kernel
with
its
own
code

Technical Comprehension
code! The sotware veri.es the
saety o updates beore
installing them! "n alternative
to reduce downtime is Ksplice!
To give it a try, you can
download the 425day trial
version or your Linux
distribution /i you are using
6buntu 7!28 or 6buntu 7!92,
then a ree version is also
available with graphical
manager0! :ou will get an
access key on registering with
Ksplice on your email 1d!'(br)
;ing is a
<<<<<<<<!
6nethical tactics employed by
companies utili+ing search
engine optimi+ation /#-=0
tactics such as link arms and
loading Web pages .lled with
irrelevant keywords, are not
welcomed by search engine
operators! This declaration was
issued by >icrosot and
?oogle!"sked i organi+ations
such as content arms are
outsmarting its system by
@ooding the Web with low5
quality content to earn high5
click rates, a >icrosot
spokesperson said the
company Apreers quality over
quantityA to manage its ;ing
search engine!A;acklinks, also
known as ,inbound links,,
should be relevant to the page
being linked to, or relevant to
an #-=,s domain i they are
being linked to the homepage,A
he told BCDet "sia in an e5mail
interview! Ee pointed out that
backlinks rom sites considered
to be authoritative in their .eld
are rated to be o higher value
than those rom A*unk
sitesA!;ing does prevent Web
sites rom appearing in its
search results i they use
techniques such as using
hidden text or links within their
Web page or create link arms
to arti.cially increase the
number o links, the >icrosot
spokesman added! Eowever,
he did not elaborate on how
the checks were implemented
Dew
search
engin
e by
?oogl
e
Dew
search
engine
by
>icroso
t
Dame o
the
algorithm
used or
#-=
Dame
o the
algori
thm
to
count
eract
#-=

Technical Comprehension
and executed!?oogle adopts a
similar stance! " ?oogle
spokesman explained that a
site,s ranking in its search
results is automatically
determined by computer
algorithms that incorporate
hundreds o parameters! A=ur
algorithms are e&ectively
designed to prevent people
rom manipulating the rankings
o competitors in our search
results,A he added!
What does
the author
mean by
the term
,social
engineerin
g,?
"n exploit is a piece o
sotware, a chunk o data, or
sequence o commands that
take advantage o a bug, glitch
or vulnerability in order to
cause unintended or
unanticipated behavior to
occur on computer sotware,
hardware, or something
electronic /usually
computerised0! This requently
includes such things as
violently gaining control o a
computer system or allowing
privilege escalation or a denial
o service attack!There are
several methods o classiying
exploits! The most common is
by how the exploit contacts the
vulnerable sotware! " ,remote
exploit, works over a network
and exploits the security
vulnerability without any prior
access to the vulnerable
system! " ,local exploit,
requires prior access to the
vulnerable system and usually
increases the privileges o the
person running the exploit past
those granted by the system
administrator! -xploits against
client applications also exist,
usually consisting o modi.ed
servers that send an exploit i
accessed with client
application! -xploits against
client applications may also
require some interaction with
the user and thus may be used
in combination with social
engineering method!"nother
classi.cation is by the action
-ngin
eering
a
piece
o
sotwa
re
which
takes
advan
tage
o an
exploi
t
"
branch
o
enginee
ring
which
prevents
vulnera
ble
systems
rom
getting
exploite
d
6sing
persuasiv
e
methods
to get the
user to
help
triggering
the
exploit
#prea
ding
exploi
ts to
other
comp
uters
by
mean
s o
the
user,s
social
netwo
rk

Technical Comprehension
against vulnerable systemF
unauthori+ed data access,
arbitrary code execution,
denial o service! >any exploits
are designed to provide
superuser5level access to a
computer system! Eowever, it
is also possible to use several
exploits, .rst to gain low5level
access, then to escalate
privileges repeatedly until one
reaches root!Dormally a single
exploit can only take
advantage o a speci.c
sotware vulnerability! =ten,
when an exploit is published,
the vulnerability is .xed
through a patch and the
exploit becomes obsolete or
newer versions o the sotware!
This is the reason why some
blackhat hackers do not
publish their exploits but keep
them private to themselves or
other crackers! #uch exploits
are reerred to as ,+ero day
exploits, and to obtain access
to such exploits is the primary
desire o unskilled attackers,
oten nicknamed script kiddies!
Eow does
unit
testing
ensure
e&ectivene
ss o
delivered
sotware?
"s a developer, testing is so
important that you should be
doing it all o the time! 1t
should not be relegated to a
speci.c stage o the
development cycle! 1t de.nitely
shouldn,t be the last thing
done beore giving your
system to a customer! Eow
else are you going to know
when you,re done? Eow else
are you going to know i your
.x or a minor bug broke a
ma*or unction o the system?
Eow else will the system be
able evolve into something
more than is currently
envisioned? Testing, both unit
and unctional, needs to be an
integrated part o the
development process!6nit
tests should become central to
how you write code, especially
i the pro*ect you are working
on has tight time constraints
=ne
careu
lly
thinks
about
the
struct
ure o
code
beore
writin
g it
=ne
writes
extensiv
e
docume
ntation
o the
sotware
being
develop
ed
=ne
creates a
set o
inputs to
the
program
and
expected
outputs
1t
canno
t be
inerr
ed
rom
the
passa
ge

Technical Comprehension
and you,d like to keep it under
control! 6nit tests are so
important that you should
write your tests beore you
write the code!6nit tests
constitute design
documentation that evolves
naturally with a system! Gead
that again! This is the Eoly
?rail o sotware development,
documentation that evolves
naturally with a system! What
better way to document a class
than to provide a coded set o
use cases! That,s what these
unit tests areF a set o coded
use cases that document what
a class does, given a controlled
set o inputs! "s such, this
design document is always up5
to5date because the unit tests
always have to pass!:ou should
write tests beore you write
code! Coing so provides a
design or the class that the
test will exercise, allowing you
to ocus on small chunks o
code! This practice also keeps
the design simple! :ou aren,t
trying to look into the uture,
implementing unnecessary
unctionality! Writing tests .rst
additionally lets you know
when the class is complete!
When all the tests pass, the
task is complete!Lastly, unit
tests provide you with a high
degree o con.dence, which
translates into developer
satisaction! 1 you run unit
tests whenever you make
changes to code, you,ll .nd out
immediately i your changes
broke something!
Eow does
a
webserver
accesses a
cookie?
1n computing, a cookie /also
tracking cookie, browser
cookie, and ETTH cookie0 is a
small piece o text stored on a
user,s computer by a web
browser! " cookie consists o
one or more name5value pairs
containing bits o inormation
such as user preerences,
shopping cart contents, the
identi.er or a server5based
The
server
itsel
stores
the
cookie
Cookie
data is
sent to
the
server
with
each
page
request
The
server
requests
the
cookie
rom the
browser
Done
o the
above

Technical Comprehension
session, or other data used by
websites!1t is sent as an ETTH
header by a web server to a
web browser and then sent
back unchanged by the
browser each time it accesses
that server! " cookie can be
used or authenticating,
session tracking /state
maintenance0, and
remembering speci.c
inormation about users, such
as site preerences or the
contents o their electronic
shopping carts! The term
AcookieA is derived rom
Amagic cookieA, a well5known
concept in 6D1I computing
which inspired both the idea
and the name o browser
cookies! #ome alternatives to
cookies exist3 each has its own
uses, advantages, and
drawbacks!;eing simple pieces
o text, cookies are not
executable! They are neither
spyware nor viruses, although
cookies rom certain sites are
detected by many anti5
spyware products because
they can allow users to be
tracked when they visit various
sites!>ost modern browsers
allow users to decide whether
to accept cookies, and the time
rame to keep them, but
re*ecting cookies makes some
websites unusable! Jor
example, shopping carts or
login systems implemented
using cookies do not work i
cookies are disabled!
Which o
the
ollowing is
D=T a part
o sixth
sense?
;asically, #ixth #ense is a mini5
pro*ector coupled with a
camera and a cellphone5which
acts as the computer and your
connection to the Cloud, all the
inormation stored on the web!
#ixth #ense can also obey
hand gestures, like in the
inamous >inority Geport!
Eowever, instead o requiring
you to be in ront o a big
screen like Tom Cruise, #ixth
#ense can do its magic5and a
"
screen
"
pro*ecto
r
" camera "
cellph
one

Technical Comprehension
lot more5everywhere, even
while you are *umping hysteric
over =prah,s soa!The camera
recogni+es ob*ects around you
instantly, with the micro5
pro*ector overlaying the
inormation on any surace,
including the ob*ect itsel or
your hand! Then, you can
access or manipulate the
inormation using your .ngers!
Deed to make a call? -xtend
your hand on ront o the
pro*ector and numbers will
appear or you to click! Deed to
know the time? Craw a circle
on your wrist and a watch will
appear! Want to take a photo?
Kust make a square with your
.ngers, highlighting what you
want to rame, and the system
will make the photo5which you
can later organi+e with the
others using your own hands
over the air!;ut those are *ust
novelty applications! The true
power o #ixth #ense lies on its
potential to connect the real
world with the 1nternet, and
overlaying the inormation on
the world itsel! 1magine you
are at the supermarket,
thinking about what brand o
soap is better! =r maybe what
wine you should get or
tonight,s dinner! Kust look at
ob*ects, hold them on your
hands, and #ixth #ense will
show you i it,s good or bad, or
i it .ts your preerences or
not!Dow take this to every
aspect o your everyday lie!
:ou can be in a taxi going to
the airport, and *ust by taking
out your boarding pass, #ixth
#ense will grab real time
inormation about your @ight
and display it over the ticket!
:ou won,t need to do any
action! Kust hold it in ront o
your and it will work! The key
here is that #ixth #ense
recogni+es the ob*ects around
you, displaying inormation
automatically and letting you
Technical Comprehension
access it in any way you want,
in the simplest way
possible!Clearly, this has the
potential o becoming the
ultimate AtransparentA user
interace or accessing
inormation about everything
around us! 1 they can get rid o
the colored .nger caps and it
ever goes beyond the initial
development phase, that is!
;ut as it is now, it may change
the way we interact with the
real world and truly give
everyone complete awareness
o the environment around us!
What is
the use o
annotation
s in
,#imple,?
#imple is a Kava ramework
used to simpliy the process o
seriali+ing and deseriali+ing
-xtensible >arkup
Language/I>L0 ob*ects! 6sing
#imple, developers can
simpliy /hence the name0 the
process o translating plain old
Kava ob*ects /H=K=s0 into I>L
documents5a process known as
seriali+ation! #imple also
acilitates the reverseF
Cevelopers can translate I>L
documents into H=K=s5a
process known as
deseriali+ation!#imple lives up
to its by name using
annotations to enable the
seriali+ation or deseriali+ation
process! H=K=s are annotated
according to how the
corresponding I>L document
should appear! #ome .elds are
annotated as attributes! =ther
.elds are annotated as
elements! The class is usually
annotated as the root element!
The ramework handles the
tedious process o interpreting
the annotations and producing
a corresponding I>L
document during the
seriali+ation process! Dot
surprisingly, the annotations
are also interpreted during the
deseriali+ation process when
an I>L document is translated
into a H=K=!The use o #imple
has several advantages! Jirst,
To
annot
ate
the
I>L
ob*ect
s
To
convert
the root
classes
into root
element
s
1t reduces
the
overhead
to
con.gure
,#imple,
Done
o the
above

Technical Comprehension
it acilitates rapid application
development! ;ecause #imple
is so simple, it enables
developers to quickly
implement robust applications
that use I>L seriali+ation and
deseriali+ation without
committing to an excessive
learning curve or development
overhead! Dext, #imple
requires no con.guration! "s
mentioned previously, #imple
uses annotations! These
annotations are in lieu o the
I>L5based con.guration .les
that typically accompany
rameworks o this
nature!Jinally, #imple adds
only minimally to the ootprint
o applications that use it! The
Kava "rchive /K"G0 .le is only
L47 kilobytes! #imple is also
not dependent upon a series o
other K"G .les, as is requently
the case with competing
rameworks!
Which .eld
o study is
used to
study
models
and
theories o
brain?
1n general a biological neural
network is composed o a
group or groups o chemically
connected or unctionally
associated neurons! " single
neuron may be connected to
many other neurons and the
total number o neurons and
connections in a network may
be extensive! Connections,
called synapses, are usually
ormed rom axons to
dendrites, though
dendrodendritic microcircuits
and other connections are
possible! "part rom the
electrical signaling, there are
other orms o signaling that
arise rom neurotransmitter
di&usion, which have an e&ect
on electrical signaling! "s such,
neural networks are extremely
complex!"rti.cial intelligence
and cognitive modeling try to
simulate some properties o
neural networks! While similar
in their techniques, the ormer
has the aim o solving
particular tasks, while the
Cognit
ive
model
ing
"rti.cial
Deural
Detwork
s
Deurotra
nsmitter
Ci&usion
-lectr
ical
#ignal
ing

Technical Comprehension
latter aims to build
mathematical models o
biological neural systems!1n
the arti.cial intelligence .eld,
arti.cial neural networks have
been applied successully to
speech recognition, image
analysis and adaptive control,
in order to construct sotware
agents /in computer and video
games0 or autonomous robots!
>ost o the currently employed
arti.cial neural networks or
arti.cial intelligence are based
on statistical estimation,
optimi+ation and control
theory!The cognitive modelling
.eld involves the physical or
mathematical modeling o the
behaviour o neural systems3
ranging rom the individual
neural level /e!g! modelling the
spike response curves o
neurons to a stimulus0, through
the neural cluster level /e!g!
modelling the release and
e&ects o dopamine in the
basal ganglia0 to the complete
organism /e!g! behavioural
modelling o the organism,s
response to stimuli0! "rti.cial
intelligence, cognitive
modelling, and neural
networks are inormation
processing paradigms inspired
by the way biological neural
systems process data!

Das könnte Ihnen auch gefallen