Answer Posted / big_narayan@yahoo.com
acces list for use the perticular using the acess network
| Is This Answer Correct ? | 3 Yes | 3 No |
Post New Answer View All Answers
Is there any website? Which can theft or watch any system or computer hardware drives(memory)while they are accessing Internet.If it is avilable what is it? Please answer me.Advance thanks
What is the importance of authentication?
Explain the network architecture?
What is network management?
Suppose when you move the nic cards from one pc to another pc, does the mac address gets transferred as well?
What will happen if we send untagged packet to a tagged port
Define nos?
What is RSTP?
User Datagram Protocol (UDP) is __ and __ a. connectionless, stateless b. connection-orineted, stateless c. connection-oriented, stateful d. connectionless, stateful
how to know how many samba users in solaris?
What do you use to write documentation? Editor? Mail reader?
Define mesh topology?
What is looping and how switching loops are avoided at L2 level?
hi this is raj igot job in tcs and also i got visa from u.s in this time i dont know what to do can u sugges me pls........
Tell me about your job profile.