The rules used to define the objects that can be accessed via a network management protocol is called ?
Which command will increase the TCP transmit and receive buffers ?
Which command will delete the route to the network 128.251.0.0 via 128.144.1.254 ?
how much salary do u expect from our company?
How do two computers communicate with each other when they are connected through L2 or L3 switch?
hi this is raj igot job in tcs and also i got visa from u.s in this time i dont know what to do can u sugges me pls........
What IP network addresses are set aside for class C (for private use) ? a. 172.16.0.0 (mask 255.240.0.0) b. 172.16.0.0 (mask 255.255.0.0) c. 196.168.0.0 (mask 255.255.0.0) d. 192.168.0.0 (mask 255.255.0.0) e. 198.168.0.0 (mask 255.255.255.0)
ATM uses howmany bytes long cells.
You want to make your own configuration file for sendmail. After editing the appropriate files, which program would you run to compile your new configuration file ?
You do not want to use any of DNS, NIS, NIS+ to resolve names. You just want to use /etc/hosts files. Which file should you copy to /etc/nsswitch.conf ?
what is the error we get if one of the disk is failed in raid1 how can i restore the data from another disk
What is Telnet ?
Three computers in California and one in Kansas City all use Microsoft Excel and Lotus CCMail is this a LAN?