Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

what purpose we are using the ARP ? what purposes we are using
ip config?

Answer Posted / jitendra ,delhi (jetking)

ARP can be defined as the protocol used to locate the devices
hardware address from the IP address,
IP config is used for see details of ip & gaitaway address

Is This Answer Correct ?    13 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?

963


What are all the technical steps involved when the data transmission from server via router?

1037


What is proxy firewall?

1003


Which are the different factors that affect the security of a network?

946


What is Cross site scripting?

1067


Diff bet ripv1 & ripv2?

958


What are the types of phishing attacks?

1084


What is shadow it?

957


What are the different type of networking / internetworking devices

954


If you need to encrypt and compress data for transmission, how would you achieve it?

1100


Explain how does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?

920


What is network security?

984


What do you do when you get blue screen in a computer? How do you troubleshoot it?

1034


How to implement PIX firewall security?

977


How do we use rsa for both authentication and secrecy?

959