Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In
Continue with Google
or use


Have an account? Sign In Now

Sign In

Continue with Google
or use

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Network Classmate Logo Network Classmate Logo
Sign InSign Up

Network Classmate

Network Classmate Navigation

  • Home
  • Article
  • Q&A
  • Guest Post
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Feed
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges

Disha Srivastava

Bronze
Ask Disha Srivastava
51 Visits
0 Followers
0 Questions
Home/ Disha Srivastava/Answers
  • About
  • Questions
  • Polls
  • Answers
  • Best Answers
  • Asked Questions
  • Followed
  • Favorites
  • Groups
  • Posts
  • Comments
  • Followers Questions
  • Followers Answers
  • Followers Posts
  • Followers Comments
  1. Asked: December 16, 2022In: Q & A

    Which Three Application Layer Protocols?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 17, 2022 at 1:48 am

    1. Hypertext Transfer Protocol (HTTP) 2. File Transfer Protocol (FTP) 3. Simple Mail Transfer Protocol (SMTP)

    1. Hypertext Transfer Protocol (HTTP)
    2. File Transfer Protocol (FTP)
    3. Simple Mail Transfer Protocol (SMTP)

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  2. Asked: December 16, 2022In: Q & A

    How To Edit Gpo In Active Directory?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 17, 2022 at 1:47 am

    1. Open the Group Policy Management Console (GPMC) by typing ‘gpmc.msc’ in the Run box. 2. In the GPMC window, select the Group Policy Object (GPO) you wish to edit. 3. Right-click on the GPO and select Edit. 4. The Group Policy Management Editor will open. 5. In the left pane, expand the folders toRead more

    1. Open the Group Policy Management Console (GPMC) by typing ‘gpmc.msc’ in the Run box.

    2. In the GPMC window, select the Group Policy Object (GPO) you wish to edit.

    3. Right-click on the GPO and select Edit.

    4. The Group Policy Management Editor will open.

    5. In the left pane, expand the folders to locate the setting you wish to edit.

    6. In the right pane, double-click on the setting you wish to edit.

    7. Make the necessary changes and click OK.

    8. Close the Group Policy Management Editor window.

    9. Close the Group Policy Management Console.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  3. Asked: December 16, 2022In: Q & A

    What Is The Difference Between 2.4 G And 5g?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 17, 2022 at 1:46 am

    2.4G is the most widely used Wi-Fi band, and operates on the 2.4GHz frequency band. It is the oldest Wi-Fi standard and offers speeds up to 54Mbps. 5G is the next generation of wireless technology, offering faster speeds and lower latency than 2.4G. 5G operates on much higher frequency bands, with sRead more

    2.4G is the most widely used Wi-Fi band, and operates on the 2.4GHz frequency band. It is the oldest Wi-Fi standard and offers speeds up to 54Mbps. 5G is the next generation of wireless technology, offering faster speeds and lower latency than 2.4G. 5G operates on much higher frequency bands, with speeds up to 10Gbps and latency as low as 1ms.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  4. Asked: December 16, 2022In: Q & A

    What Is The Difference Between Fiber Optic And Copper Cable?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 17, 2022 at 1:45 am

    Fiber optic cable is made of glass or plastic fibers, whereas copper cable is made of metal wires. Fiber optic cable is capable of transmitting data at much higher speeds than copper cable and is less susceptible to interference from outside sources. Fiber optic cable also has a much lower attenuatiRead more

    Fiber optic cable is made of glass or plastic fibers, whereas copper cable is made of metal wires. Fiber optic cable is capable of transmitting data at much higher speeds than copper cable and is less susceptible to interference from outside sources. Fiber optic cable also has a much lower attenuation rate, meaning that signals can travel over much longer distances without needing to be boosted. Fiber optic cable is more expensive than copper cable, however.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  5. Asked: December 16, 2022In: Q & A

    Which Two Devices Would Be Described As End Devices?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 17, 2022 at 1:44 am

    1. Laptop 2. Smartphone

    1. Laptop
    2. Smartphone

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  6. Asked: December 16, 2022In: Q & A

    How To Find Ttl In Wireshark?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 17, 2022 at 1:44 am

    To find the TTL (Time To Live) value in Wireshark, open the packet details window and look for the IP header section. The TTL value will be listed in the header, usually as a hexadecimal number.

    To find the TTL (Time To Live) value in Wireshark, open the packet details window and look for the IP header section. The TTL value will be listed in the header, usually as a hexadecimal number.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  7. Asked: December 16, 2022In: Q & A

    How To Run Two Wifi Routers?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 17, 2022 at 1:43 am

    1. Connect the two routers together by using an Ethernet cable. Connect one end of the cable to the LAN port on the first router and the other end to the WAN port on the second router. 2. Log into the first router’s web interface by typing in the IP address into the address bar of a web browser. 3.Read more

    1. Connect the two routers together by using an Ethernet cable. Connect one end of the cable to the LAN port on the first router and the other end to the WAN port on the second router.

    2. Log into the first router’s web interface by typing in the IP address into the address bar of a web browser.

    3. Change the LAN IP address of the first router to something different than the second router.

    4. Log into the second router’s web interface and change the LAN IP address to match the first router.

    5. Enable DHCP on both routers and configure the DHCP range to be different.

    6. Connect the two routers to the modem with two Ethernet cables. Connect one to the WAN port of the first router and the other to the WAN port of the second router.

    7. Configure the wireless settings on the second router to be different from the first.

    8. Save the settings on both routers and then connect devices to the two wireless networks.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  8. Asked: December 16, 2022In: Q & A

    What Is Type 2 Nat Type?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 17, 2022 at 1:42 am

    Type 2 NAT type is a configuration that is considered to be less secure than Type 1 NAT type. Type 2 NAT type allows some incoming connections, such as incoming communications for certain online gaming and applications, but it does not provide the same level of security as Type 1 NAT type.

    Type 2 NAT type is a configuration that is considered to be less secure than Type 1 NAT type. Type 2 NAT type allows some incoming connections, such as incoming communications for certain online gaming and applications, but it does not provide the same level of security as Type 1 NAT type.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  9. Asked: December 16, 2022In: Q & A

    What Is The Most Secure Cryptocurrency?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 17, 2022 at 1:40 am

    The most secure cryptocurrency is one that has a robust technology platform with a strong security protocol and a decentralized network. Examples of these include Bitcoin, Ethereum, Monero, Zcash, and Dash. Each of these cryptocurrencies has its own set of security features and protocols designed toRead more

    The most secure cryptocurrency is one that has a robust technology platform with a strong security protocol and a decentralized network. Examples of these include Bitcoin, Ethereum, Monero, Zcash, and Dash. Each of these cryptocurrencies has its own set of security features and protocols designed to protect user funds and transaction data.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  10. Asked: December 16, 2022In: Q & A

    How To Remove Saved Username And Password?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 17, 2022 at 1:39 am

    1. Open your web browser. 2. Go to the settings page. 3. Click on the “Privacy” tab. 4. Select the “Saved Passwords” option. 5. Click on the “Remove” button next to the username and password you wish to delete. 6. Confirm your choice by clicking “OK” or “Yes”. 7. Your saved username and password wilRead more

    1. Open your web browser.
    2. Go to the settings page.
    3. Click on the “Privacy” tab.
    4. Select the “Saved Passwords” option.
    5. Click on the “Remove” button next to the username and password you wish to delete.
    6. Confirm your choice by clicking “OK” or “Yes”.
    7. Your saved username and password will be removed.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
1 … 25 26 27 28 29 … 52

Sidebar

Top Members

Shailendra Yadav

Shailendra Yadav

  • 2k Questions
  • 52k Points
Level 50
Sneha Singh

Sneha Singh

  • 2k Questions
  • 41k Points
Level 40
Nilay Sharma

Nilay Sharma

  • 0 Questions
  • 33k Points
Level 30
  • Popular
  • Comments
  • Farwa Khalid

    Half Duplex Versus Full Duplex

    • 3 Comments
  • Farwa Khalid

    What Is Wireless Isolation?

    • 0 Comments
  • Farwa Khalid

    What Is Ping Spoofing

    • 0 Comments
  • Farwa Khalid

    What Is Radio Network Controller?

    • 0 Comments
  • Farwa Khalid

    What Is A Typical Symptom Of A CMOS Battery Failure?

    • 0 Comments
  • What is Circuit Switching - Network Classmate
    What is Circuit Switching - Network Classmate added a comment […] needs to be established. It is additive into two… November 30, 2022 at 11:36 am
  • Difference Between Router And Switch - Network Classmate
    Difference Between Router And Switch - Network Classmate added a comment […] router works in the full-duplex transmission mode. However, we… November 30, 2022 at 11:36 am
  • Communication Protocols - Network Classmate
    Communication Protocols - Network Classmate added a comment […] receiver. It is two wired protocols. Rx and Tx… November 30, 2022 at 11:35 am

  • Home
  • Groups page
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Communities
  • Polls
  • Tags
  • Badges




Footer

Important Links

  • Home
  • Article
  • Q&A
  • Guest Post

Useful Categories

  • Basic Networking
  • Basic Security
  • CCNA R & S
  • CCNA Security
  • Download

Legal Stuff

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • User Data Policy

Social Links

  • Facebook
  • Instagram
  • Twitter
  • Telegram
  • Linkedin

Copyrights © 2023 Network Classmate™. All Rights Reserved.
Designed by LeadsNut