Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In
Continue with Google
or use


Have an account? Sign In Now

Sign In

Continue with Google
or use

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Network Classmate Logo Network Classmate Logo
Sign InSign Up

Network Classmate

Network Classmate Navigation

  • Home
  • Article
  • Q&A
  • Guest Post
Search
Ask A Question

Mobile menu

Close
  • Home
  • Feed
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges

Disha Srivastava

Bronze
Ask Disha Srivastava
56 Visits
0 Followers
0 Questions
Home/ Disha Srivastava/Answers
  • About
  • Questions
  • Polls
  • Answers
  • Best Answers
  • Asked Questions
  • Followed
  • Favorites
  • Groups
  • Posts
  • Comments
  • Followers Questions
  • Followers Answers
  • Followers Posts
  • Followers Comments
  1. Asked: December 10, 2022In: Q & A

    Which Information Does a Switch Use To Keep The Mac Address Table Information Current??

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 18, 2022 at 6:05 pm

    A switch will use a process known as address learning to keep its MAC address table information current. The switch will look at the source MAC address of the frames it receives and use that address to update its MAC address table.

    A switch will use a process known as address learning to keep its MAC address table information current. The switch will look at the source MAC address of the frames it receives and use that address to update its MAC address table.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  2. Asked: December 10, 2022In: Q & A

    How To Use a Linksys Router As a Wifi Extender?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 18, 2022 at 6:04 pm

    1. Connect your Linksys router to an existing internet connection. You can use an Ethernet cable to connect to a modem, or another router. 2. Log into your Linksys router’s web-based setup page. 3. Change the router’s default settings. You will need to change the IP address, the subnet mask, the defRead more

    1. Connect your Linksys router to an existing internet connection. You can use an Ethernet cable to connect to a modem, or another router.

    2. Log into your Linksys router’s web-based setup page.

    3. Change the router’s default settings. You will need to change the IP address, the subnet mask, the default gateway and the DNS servers.

    4. Select the Wireless tab, and then select the Wireless Network Mode. Set this to “Repeater”.

    5. Enter the SSID of the existing wireless network you want to extend.

    6. Enter the security settings of the existing wireless network.

    7. Set the Channel Width to the same as the existing wireless network.

    8. Save the settings and reboot the router.

    9. Test the connection to ensure that the Linksys router is successfully extending the wireless network.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  3. Asked: December 10, 2022In: Q & A

    Why We Need Public Ip Address?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 18, 2022 at 6:03 pm

    Public IP addresses are needed for devices that need to communicate over the internet, such as websites and online services. This is because only devices with public IP addresses can be accessed from outside of a private network. Without public IP addresses, it would be impossible for users outsideRead more

    Public IP addresses are needed for devices that need to communicate over the internet, such as websites and online services. This is because only devices with public IP addresses can be accessed from outside of a private network. Without public IP addresses, it would be impossible for users outside of a private network to access websites or services hosted on those networks.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  4. Asked: December 18, 2022In: Q & A

    Pdu Format Used When Bits Are Received?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 18, 2022 at 5:53 pm

    The PDU format used when bits are received is the Physical Layer Protocol Data Unit (PPDU). It contains the received data bits, along with control information such as the sender's address, receiver's address, and error-checking information.

    The PDU format used when bits are received is the Physical Layer Protocol Data Unit (PPDU). It contains the received data bits, along with control information such as the sender’s address, receiver’s address, and error-checking information.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  5. Asked: December 18, 2022In: Q & A

    How Do I Know If Malware Is On My Computer?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 18, 2022 at 5:52 pm

    If you suspect that your computer may have been infected with malware, there are several steps you can take to determine if you are indeed infected. The first step is to run a full system scan using an antivirus or anti-malware program. This will check for any malicious software that may have been iRead more

    If you suspect that your computer may have been infected with malware, there are several steps you can take to determine if you are indeed infected.

    The first step is to run a full system scan using an antivirus or anti-malware program. This will check for any malicious software that may have been installed on your system. If any malicious software is found, it can be removed by the program.

    The second step is to check for any suspicious activity on your computer. This includes unexplained pop-up windows, slow performance, changes to your browser settings, etc. If you suspect that something is amiss, it is best to run a full system scan as soon as possible.

    Finally, if you are still unsure whether or not your computer is infected, you can contact a professional IT security specialist who can provide further advice and assistance.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  6. Asked: December 18, 2022In: Q & A

    What To Do If a Scammer Gets Your Email Address?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 18, 2022 at 5:51 pm

    If a scammer gets your email address, the best thing to do is to not respond to any emails from them. You should also delete any emails from them without opening them. Additionally, you should mark any emails from the scammer as spam and report them to your email provider. Additionally, you should cRead more

    If a scammer gets your email address, the best thing to do is to not respond to any emails from them. You should also delete any emails from them without opening them. Additionally, you should mark any emails from the scammer as spam and report them to your email provider. Additionally, you should change your password to your email account and enable two-factor authentication if possible. Finally, you should consider setting up a separate email address to use when signing up for websites or services.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  7. Asked: December 18, 2022In: Q & A

    What Is 1and1 Hosting?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 18, 2022 at 5:51 pm

    1and1 Hosting is a web hosting company that is owned by United Internet, a German internet company. 1and1 offers a wide range of web hosting services, including shared hosting, dedicated server hosting, VPS hosting, and WordPress hosting. They also offer domain registration, website design and develRead more

    1and1 Hosting is a web hosting company that is owned by United Internet, a German internet company. 1and1 offers a wide range of web hosting services, including shared hosting, dedicated server hosting, VPS hosting, and WordPress hosting. They also offer domain registration, website design and development, online marketing, and eCommerce services.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  8. Asked: December 18, 2022In: Q & A

    Which Of The Following Algorithms Are Used In Asymmetric Encryption?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 18, 2022 at 5:49 pm

    1. RSA (Rivest–Shamir–Adleman) 2. Diffie-Hellman 3. Elliptic Curve Cryptography (ECC) 4. Digital Signature Algorithm (DSA) 5. ElGamal

    1. RSA (Rivest–Shamir–Adleman)
    2. Diffie-Hellman
    3. Elliptic Curve Cryptography (ECC)
    4. Digital Signature Algorithm (DSA)
    5. ElGamal

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  9. Asked: December 18, 2022In: Difference Between

    Raid 0 Vs Raid 1?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 18, 2022 at 5:49 pm

    RAID 0 stands for "Redundant Array of Inexpensive Disks" and is used to improve the performance of a computer system. RAID 0 works by spreading data across multiple storage devices, thereby improving the read and write speeds of the system. RAID 1 stands for "Redundant Array of Independent Disks" anRead more

    RAID 0 stands for “Redundant Array of Inexpensive Disks” and is used to improve the performance of a computer system. RAID 0 works by spreading data across multiple storage devices, thereby improving the read and write speeds of the system.

    RAID 1 stands for “Redundant Array of Independent Disks” and is used to provide data redundancy, meaning the data is stored on two or more disks and can be recovered in the event of a disk failure. RAID 1 also improves read and write performance compared to a single disk, but not as much as RAID 0.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  10. Asked: December 18, 2022In: Q & A

    What Is Better Tkip Or Aes?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 18, 2022 at 5:48 pm

    AES (Advanced Encryption Standard) is generally considered to be more secure than TKIP (Temporal Key Integrity Protocol). AES is a more secure encryption protocol than TKIP because it uses a 256-bit key, while TKIP uses a 128-bit key. Additionally, AES is more resistant to network attacks than TKIP.

    AES (Advanced Encryption Standard) is generally considered to be more secure than TKIP (Temporal Key Integrity Protocol). AES is a more secure encryption protocol than TKIP because it uses a 256-bit key, while TKIP uses a 128-bit key. Additionally, AES is more resistant to network attacks than TKIP.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
1 … 10 11 12 13 14 … 52

Sidebar

Top Members

Shailendra Yadav

Shailendra Yadav

  • 2k Questions
  • 52k Points
Level 50
Sneha Singh

Sneha Singh

  • 2k Questions
  • 41k Points
Level 40
Nilay Sharma

Nilay Sharma

  • 0 Questions
  • 33k Points
Level 30
  • Popular
  • Comments
  • Farwa Khalid

    Half Duplex Versus Full Duplex

    • 3 Comments
  • Farwa Khalid

    What Is Wireless Isolation?

    • 0 Comments
  • Farwa Khalid

    What Is Ping Spoofing

    • 0 Comments
  • Farwa Khalid

    What Is Radio Network Controller?

    • 0 Comments
  • Farwa Khalid

    What Is A Typical Symptom Of A CMOS Battery Failure?

    • 0 Comments
  • What is Circuit Switching - Network Classmate
    What is Circuit Switching - Network Classmate added a comment […] needs to be established. It is additive into two… November 30, 2022 at 11:36 am
  • Difference Between Router And Switch - Network Classmate
    Difference Between Router And Switch - Network Classmate added a comment […] router works in the full-duplex transmission mode. However, we… November 30, 2022 at 11:36 am
  • Communication Protocols - Network Classmate
    Communication Protocols - Network Classmate added a comment […] receiver. It is two wired protocols. Rx and Tx… November 30, 2022 at 11:35 am

  • Home
  • Groups page
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Communities
  • Polls
  • Tags
  • Badges




Footer

Important Links

  • Home
  • Article
  • Q&A
  • Guest Post

Useful Categories

  • Basic Networking
  • Basic Security
  • CCNA R & S
  • CCNA Security
  • Download

Legal Stuff

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • User Data Policy

Social Links

  • Facebook
  • Instagram
  • Twitter
  • Telegram
  • Linkedin

Copyrights © 2023 Network Classmate™. All Rights Reserved.
Designed by LeadsNut