Networking Protocols (671)
Networking Administration (1008)
Networking Security (196)
Networking General (266)
Networking AllOther (430) A System programmer have access to computer room, it is possible that he may undertake some unauthorised activities at any time, due to his deep knowledge how can a control build to avoid the risk?
3 6987when a computer is restart,it will not show startup screen and instead a Beep sound is continuosly appearing,what could be the reason and there are important files and folders present in the system.what should be needed to do to bring the system to its normal state?
8 8938what is the name of the Jack used for Network Setup between one computer to Another and from computer to another device?
2 4797Is it possible for a User to change Admin Password who is not a part of Admin group if so how is it possible?
2 5024
Convert the IP address 197.228.17.56 into binary ?
What is meant by port blocking within lan?
How do cryptography-based keys ensure the validity of data transferred across the network?
Assuming classful addressing, find the no of subnets and the no of hosts per subnet for the following blocks: (i) 122.45.77.32/20 (ii) A class B block having mask of 255.255.192.0
What is sliding window protocol ?
Explain Synchronous transmission.
How do I find out what service is using a port?
What are the 4 layers of tcp ip?
Why is tcp more reliable?
How can a network be certified as an effective network? What are the factors affecting them?
What is netsh interface?
What are Network Services and Feature Services? What is the difference between them?
Explain dhcp briefly?
Explain Traffic shaping using token bucket algorithm
In a network that contains two servers and twenty workstations, where is the best place to install an anti-virus program?