Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In
Continue with Google
or use


Have an account? Sign In Now

Sign In

Continue with Google
or use

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Network Classmate Logo Network Classmate Logo
Sign InSign Up

Network Classmate

Network Classmate Navigation

  • Home
  • Article
  • Q&A
  • Guest Post
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Feed
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges

Disha Srivastava

Bronze
Ask Disha Srivastava
51 Visits
0 Followers
0 Questions
Home/ Disha Srivastava/Answers
  • About
  • Questions
  • Polls
  • Answers
  • Best Answers
  • Asked Questions
  • Followed
  • Favorites
  • Groups
  • Posts
  • Comments
  • Followers Questions
  • Followers Answers
  • Followers Posts
  • Followers Comments
  1. Asked: December 16, 2022In: Q & A

    What’s The Difference Between 4 G And 5g?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 16, 2022 at 8:46 pm

    4G (4th generation) is the fourth generation of mobile telephone technology, which is currently the most widely used technology. It offers faster download and upload speeds than 3G, allowing for faster streaming of video, music, and other data. 5G (5th generation) is the fifth generation of mobile tRead more

    4G (4th generation) is the fourth generation of mobile telephone technology, which is currently the most widely used technology. It offers faster download and upload speeds than 3G, allowing for faster streaming of video, music, and other data. 5G (5th generation) is the fifth generation of mobile telephone technology, which promises to be much faster than 4G, with download speeds up to 10 times faster. 5G also has the potential to support more devices and connections, making it a more efficient network than 4G. It also has the potential to offer lower latency, which will make applications like virtual reality and gaming more responsive.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  2. Asked: December 16, 2022In: Q & A

    What Is Usb C To Hdmi?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 16, 2022 at 8:44 pm

    USB-C to HDMI is a cable or adapter that allows you to connect a device that has a USB-C port (such as a laptop or smartphone) to an HDMI display device (such as a television or monitor). This allows you to view content from your device on a larger screen.

    USB-C to HDMI is a cable or adapter that allows you to connect a device that has a USB-C port (such as a laptop or smartphone) to an HDMI display device (such as a television or monitor). This allows you to view content from your device on a larger screen.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  3. Asked: December 16, 2022In: Q & A

    How To Use Rufus To Install Ubuntu?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 16, 2022 at 8:43 pm

    1. Download and install Rufus from the official website. 2. Insert your USB drive into your computer and launch Rufus. 3. In the Device box, select your USB drive. 4. Under the Format Options section, select the ‘Create a bootable disk using’ option and choose ISO Image from the drop-down menu. 5. CRead more

    1. Download and install Rufus from the official website.

    2. Insert your USB drive into your computer and launch Rufus.

    3. In the Device box, select your USB drive.

    4. Under the Format Options section, select the ‘Create a bootable disk using’ option and choose ISO Image from the drop-down menu.

    5. Click the CD/DVD drive icon to the right of this option and select the Ubuntu ISO file.

    6. Click Start to begin the process.

    7. Once the process is complete, remove the USB drive from your computer.

    8. Insert the USB drive into the computer you want to install Ubuntu on and turn it on.

    9. Change the boot order in the BIOS so that the computer boots from the USB drive.

    10. When the boot menu appears, select the ‘Install Ubuntu’ option and follow the prompts to complete the installation.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  4. Asked: December 16, 2022In: Q & A

    How To Get Password From Shadow File?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 16, 2022 at 8:42 pm

    In order to get the password from a shadow file, you will need to use a tool such as John the Ripper to crack the encrypted password stored in the shadow file. John the Ripper is a free, open-source password cracking tool that can be used to recover lost passwords from various types of shadow files.

    In order to get the password from a shadow file, you will need to use a tool such as John the Ripper to crack the encrypted password stored in the shadow file. John the Ripper is a free, open-source password cracking tool that can be used to recover lost passwords from various types of shadow files.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  5. Asked: December 16, 2022In: Q & A

    How To Convert Decimal To Binary By Hand?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 16, 2022 at 8:40 pm

    1. Write down the decimal number. 2. Divide the number by 2. 3. Get the integer quotient for the next iteration. 4. Get the remainder for the binary digit. 5. Repeat the steps until the quotient is equal to 0. 6. Write down all the remainders in reverse order. That’s your binary number. For example:Read more

    1. Write down the decimal number.
    2. Divide the number by 2.
    3. Get the integer quotient for the next iteration.
    4. Get the remainder for the binary digit.
    5. Repeat the steps until the quotient is equal to 0.
    6. Write down all the remainders in reverse order. That’s your binary number.

    For example:

    Decimal number: 43

    43 / 2 = 21 (Remainder: 1)

    21 / 2 = 10 (Remainder: 1)

    10 / 2 = 5 (Remainder: 0)

    5 / 2 = 2 (Remainder: 1)

    2 / 2 = 1 (Remainder: 0)

    1 / 2 = 0 (Remainder: 1)

    Binary number: 101011

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  6. Asked: December 16, 2022In: Q & A

    How To Skip a Line In C?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 16, 2022 at 8:39 pm

    The easiest way to skip a line in C is by using the \n character, which is the new line character. This will move the cursor to the next line.

    The easiest way to skip a line in C is by using the \n character, which is the new line character. This will move the cursor to the next line.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  7. Asked: December 16, 2022In: Q & A

    What Is Open Port Scanner?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 16, 2022 at 8:38 pm

    An open port scanner is a tool used to scan a network for open ports. Open ports are network ports that have an application or service listening on them and are accessible from the internet. Open port scanners are used to detect which ports are open, as well as to discover services that are listeninRead more

    An open port scanner is a tool used to scan a network for open ports. Open ports are network ports that have an application or service listening on them and are accessible from the internet. Open port scanners are used to detect which ports are open, as well as to discover services that are listening on those ports. They can also be used to detect possible security vulnerabilities and to identify which ports are closed.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  8. Asked: December 16, 2022In: Q & A

    How To Install Google Chrome On Ubuntu 18.04?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 16, 2022 at 8:36 pm

    1. Open a terminal window 2. Type in the following command to add the Google Chrome repository to your system: sudo sh -c 'echo "deb [arch=amd64] http://dl.google.com/linux/chrome/deb/ stable main" >> /etc/apt/sources.list.d/google.list' 3. Update your system's package list: sudo apt-get updatRead more

    1. Open a terminal window
    2. Type in the following command to add the Google Chrome repository to your system:
    sudo sh -c ‘echo “deb [arch=amd64] http://dl.google.com/linux/chrome/deb/ stable main” >> /etc/apt/sources.list.d/google.list’
    3. Update your system’s package list:
    sudo apt-get update
    4. Install Google Chrome:
    sudo apt-get install google-chrome-stable
    5. After installation is complete, run Google Chrome from your applications menu.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  9. Asked: December 16, 2022In: Q & A

    What Is The Purpose Of Srtp?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 16, 2022 at 8:34 pm

    Secure Real-time Transport Protocol (SRTP) is a network protocol designed to provide encryption and authentication for real-time communications such as voice and video. It is used to protect VoIP and other streaming media traffic by applying encryption, authentication, and integrity checks to the daRead more

    Secure Real-time Transport Protocol (SRTP) is a network protocol designed to provide encryption and authentication for real-time communications such as voice and video. It is used to protect VoIP and other streaming media traffic by applying encryption, authentication, and integrity checks to the data. SRTP is most commonly used for secure VoIP communications, providing confidentiality, message authentication and integrity, and replay protection.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  10. Asked: December 16, 2022In: Q & A

    Which Is Better Wpa Or Wpa2?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 16, 2022 at 8:33 pm

    WPA2 is generally considered to be the better of the two, as it provides stronger encryption and is more secure. WPA2 also supports more advanced protocols, such as AES and CCMP, which are more difficult to break through.

    WPA2 is generally considered to be the better of the two, as it provides stronger encryption and is more secure. WPA2 also supports more advanced protocols, such as AES and CCMP, which are more difficult to break through.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
1 … 32 33 34 35 36 … 52

Sidebar

Top Members

Shailendra Yadav

Shailendra Yadav

  • 2k Questions
  • 52k Points
Level 50
Sneha Singh

Sneha Singh

  • 2k Questions
  • 41k Points
Level 40
Nilay Sharma

Nilay Sharma

  • 0 Questions
  • 33k Points
Level 30
  • Popular
  • Comments
  • Farwa Khalid

    Half Duplex Versus Full Duplex

    • 3 Comments
  • Farwa Khalid

    What Is Wireless Isolation?

    • 0 Comments
  • Farwa Khalid

    What Is Ping Spoofing

    • 0 Comments
  • Farwa Khalid

    What Is Radio Network Controller?

    • 0 Comments
  • Farwa Khalid

    What Is A Typical Symptom Of A CMOS Battery Failure?

    • 0 Comments
  • What is Circuit Switching - Network Classmate
    What is Circuit Switching - Network Classmate added a comment […] needs to be established. It is additive into two… November 30, 2022 at 11:36 am
  • Difference Between Router And Switch - Network Classmate
    Difference Between Router And Switch - Network Classmate added a comment […] router works in the full-duplex transmission mode. However, we… November 30, 2022 at 11:36 am
  • Communication Protocols - Network Classmate
    Communication Protocols - Network Classmate added a comment […] receiver. It is two wired protocols. Rx and Tx… November 30, 2022 at 11:35 am

  • Home
  • Groups page
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Communities
  • Polls
  • Tags
  • Badges




Footer

Important Links

  • Home
  • Article
  • Q&A
  • Guest Post

Useful Categories

  • Basic Networking
  • Basic Security
  • CCNA R & S
  • CCNA Security
  • Download

Legal Stuff

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • User Data Policy

Social Links

  • Facebook
  • Instagram
  • Twitter
  • Telegram
  • Linkedin

Copyrights © 2023 Network Classmate™. All Rights Reserved.
Designed by LeadsNut