Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

what is the troublshooting the network

Answer Posted / somnath

The transaction of data of computers from one place to
another with the healp of network devices is called
Networking.

Is This Answer Correct ?    1 Yes 5 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Explain Token ring

1642


Explain 1-persistent, p-persistent and 0-persistent CSMA giving strong and weak points of each.

3159


Compare satellite with fiber as a communication medium and enumerate the application areas where satellite still holds a niche(or special)marker.

1865


Differentiate between IEEE 802.3, IEEE 802.4 and IEEE 802.5 standards.

5014


Write two ways in which computer applications differ from network applications ?

1743


what is the command to check how many port numbers are running with their specific protocols in linux pc

2444


What are the two reasons for using layered protocols?

4013


Define CableServe

1289


Am planning to do a course on Remote Infrastructure Management.Is it a good field. And one more thing. Am planning to join Talent Sprint, Hyd. How good is this institute. Please help fast

3354


Give two examples of a ‘collision-free’ protocol ?

1940


Explain the advantage and disadvantage of ethernet ?

2557


Why is IP called ‘best-effort delivery’ protocol?

3159


List out the main responsibilities of the network layer.

1906


What is the difference between IE 6 & 8?

2478


How do cryptography-based keys ensure the validity of data transferred across the network?

6764