what is difference between spyware and mallware ? why we use
this ?
Answer / deena
1. Malware covers a lot of different software, Spyware is just one of them
2. Spyware often doesn’t cause major damage but other malware can
3. While other malware can impair the function of your computer, spyware can extract personal information like credit card numbers
4. Spyware takes up processing power and a part of the bandwidth of your internet connection
| Is This Answer Correct ? | 3 Yes | 1 No |
Which command allows you to monitor the routing requests that are not getting resolved from the routing table ?
Explain the network architecture?
Solaris will run routed if what file exists.
You have a Class C network. You want to subnet it such that you have at least 6 hosts per subnet. How many subnets can you have?
in vcs, which network[private or public] channel bandwidth is high?
In network topology what is called as one large coaxial cable joins all the computers.
what is Organiser? what is work
How does ToS bit work?
What protocol counts hops from router to router to find the shortest path? a. DHCP b. RIP c. SNMP d. IP e. DLC
Which file serves as the configuration file for sendmail ?
Draw network configuration and protocol layer interface architecture for a multiprotocol bridge that interconnects an Ethernet LAN to a token-ring LAN.
0 Answers Kent, Kent State University,
Which of the following protocols are application protocols? a. ARP b. RIP c. FTP d. NFS