Answer Posted / harsha
its like antivirus
| Is This Answer Correct ? | 3 Yes | 20 No |
Post New Answer View All Answers
When is a translating bridge used ?
Explain Wireless networks.
Explain any three error detection and correction techniques.
If i want to crack any serial key using system information then how can i do it? Is it possible?
Which layer is used to detect and correct errors
what happens when two consigitive ports of switch are connacted using one cross cabel with each other?(how the whole network gets down)
1. What ports does FTP traffic travel over? 2. What ports does mail traffic utilize? 3. What ports do HTTP and HTTPS use? 4. Why is NTP required in an NFS network? 5. Name some common mal software on the server side 6. What is CPAN? How do you access it? 7. What is PEAR? 8. What advantages does mod_perl have over a perl CGI? 9. What is required to do SSL in Apache 1.x? 10. What is Tcl? 11. What is a servlet engine/container? 12. What is BIND? 13. Name the steps to setup a slave zone in BIND 14. Name the steps to setup a primary zone in BIND 15. What commands would you use under Solaris or Linux to modify/view an LDAP tree?
Explain Salient difference between ISO-OSI and TCP/IP models.
IN MY SYSTEM IAM USING VM WARE I INSTALLED 2003 SREVER AND TWO CLIENTS USING SAME 2003SERVER NOW I WOULD LIKE TO INSTALL EXCHANGE SREVER IN MY VM WARE IS IT POSSIBLE IF IT IS PLEASE SHOW ME A ROOT HOW CAN I
what is upsizing and downizing?
What is logical link control
What is a minimum data size of an Ethernet frame ?
What was the reason for selecting a speed of 155.52 Mbps in the original ATM standard ?
How does a token ring network work ? In what way is it different from Ethernet ?
Write a short note on ISDN?