What are the drawbacks of implementing a ring topology?
No Answer is Posted For this Question
Be the First to Post Answer
how to load a software in server
6 Answers Accenture, EDS, HP, Mphasis, Wipro,
how can i login without password through ssh
The following are the steps toward encapsulation. Put them in order: 1. User input 2. data 3. frame 4. segment 5. datagram 6. bits a. 1-4-2-5-3-6 b. 1-5-4-2-3-6 c. 1-2-3-5-4-6 d. 1-2-4-5-3-6
Explain 802.1Q header?.
Name 3 commands will let you logon to another machine ?
Which command identifies all RPC services on a host called server ?
What kind of cables can be called UTP cables ?
Which command would you use to kill a process by name ?
Purpose of TTL. How it gets modified.
what is ROI?
Which command lists versions and states of the mountd service running on a host called unix1 ?
Your HOSTS file looks like this: 11.12.13 UNIX programmer # Programmers FTP server 11.12.14 server 11.12.15 UNIX developer #Developers FTP server 11.12.20 developer # developer you try to ftp developer, you can connect to the right server. But you try ftp 10.11.12.20, you fail to connect. Why?