Answer Posted / prashant
In a Company Or A Organization the Users Login Security
Given By Administrator.
Is This Answer Correct ? | 5 Yes | 0 No |
Post New Answer View All Answers
How does a token ring network work ? In what way is it different from Ethernet ?
What is virtual path
Dear Sir, I have installed 40 HCL thin clients model BVX 4000 on windows 2003 server in the RDP mode, Processor is xeon 3040 1.667 GHZ, with 320 GB SATA Hard Disc and and 1 GB RAM ECC DDR II RAM , in have also expanded the RAM to 8 GB. but still the Graphics and ppt are opening in frames. please do suggest me how can i use these thin Clients to work in the normal pc mode so that the graphics( Photos .JPEG images and normal power point presentations.? Regards ather.
In which of the 7 layers of OSI will a service handling conversion of characters is from EBCDIC to ASCII be normally implemented ?
What is the difference between IE 6 & 8?
Contrast link state and distance vector routing protocols, giving an example of each.
If i want to crack any serial key using system information then how can i do it? Is it possible?
Explain various cabling techniques used in IEEE 802.3 standard.
Explain Any Standalnoe Application with rispect to OSI model, letus Consider Voice Recognition....!! One Has To tell function of all layers with rispect to given Application.
Define Explore a world of satellite solutions?
Draw the IP datagram header format. “IP datagram has a checksum field still it is called an unreliable protocol”. Justify?
What is NVT (Network Virtual Terminal)
Why transport layer protocols like TCP and UDP are called end-to-end protocols. What is the difference between them?
How kernal work in operating system?
what is buffering and flooding in NIC ?