Answer Posted / syed balal rumy
you must having Administrative privilledge, use Run :-
gpedit.msc command
| Is This Answer Correct ? | 4 Yes | 1 No |
Post New Answer View All Answers
Give some drawbacks of implementing a ring topology?
respected sir., i need knowledge, i want to do R.H.E.C but problem is this i am science graduate and a new to software line, i want to develop my carrier in I.t sector. please guide. thanks
What is looping and how switching loops are avoided at L2 level?
Explain backbone network?
Scenario: “In a switch two hosts are connected to port number 1 and 2 respectively; both the ports are configured with same VLAN id. When data is sent from one host to another, in switch VLAN tagging will happen or not? Why?”
Give the importance of the osi physical layer?
What is tunnel mode?
Explain netstat?
Define 10base-t?
Explain the major disadvantage of a star topology?
Give the function of the osi session layer?
one client is uanble to connect web server it is located in some remote location what are the problems how to troubleshoot the problem
Tell me which protocol can be applied when you want to transfer files between different platforms, such between unix systems and windows servers?
Please list the types of Firewalls, Routers, Switches, Servers, you manage?
I am using solaris box, I need to delete a file from path /usr/tmp/ which r older than 24 hours?