Networking Protocols (671)
Networking Administration (1008)
Networking Security (196)
Networking General (266)
Networking AllOther (430) A System programmer have access to computer room, it is possible that he may undertake some unauthorised activities at any time, due to his deep knowledge how can a control build to avoid the risk?
3 7123when a computer is restart,it will not show startup screen and instead a Beep sound is continuosly appearing,what could be the reason and there are important files and folders present in the system.what should be needed to do to bring the system to its normal state?
8 9201what is the name of the Jack used for Network Setup between one computer to Another and from computer to another device?
2 4920Is it possible for a User to change Admin Password who is not a part of Admin group if so how is it possible?
2 5122
What is an encoder?
How do two computers communicate with each other when they are connected through L2 or L3 switch?
Explain the advantage and disadvantage of ethernet ?
Normally they r setting question 4rm time@distance,time@work,ages,cisterns@pipes,etc
Where is tcp used?
hi this is raj igot job in tcs and also i got visa from u.s in this time i dont know what to do can u sugges me pls........
Diff bet ripv1 & ripv2?
What is ISDN and Q.931?
What is port 443 normally used for?
What is ospf protocol
Why do we not use inductance in lag network? Explain in detail.
Why is it important to have a nac solution?
What is the difference between phone button template and soft-key template?
What happens when flag is set to zero in a modem during packet data transfer?
Explain Traffic shaping using token bucket algorithm