Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In
Continue with Google
or use


Have an account? Sign In Now

Sign In

Continue with Google
or use

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Network Classmate Logo Network Classmate Logo
Sign InSign Up

Network Classmate

Network Classmate Navigation

  • Home
  • Article
  • Q&A
  • Guest Post
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Feed
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges

Disha Srivastava

Bronze
Ask Disha Srivastava
39 Visits
0 Followers
0 Questions
Home/ Disha Srivastava/Answers
  • About
  • Questions
  • Polls
  • Answers
  • Best Answers
  • Asked Questions
  • Followed
  • Favorites
  • Groups
  • Posts
  • Comments
  • Followers Questions
  • Followers Answers
  • Followers Posts
  • Followers Comments
  1. Asked: December 15, 2022In: Q & A

    Which Pair Of Events Illustrates An Accurate Cause-And-Effect Relationship?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 15, 2022 at 9:32 pm

    A: Turning off the lights leads to a decrease in electricity bills.

    A: Turning off the lights leads to a decrease in electricity bills.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  2. Asked: December 15, 2022In: Q & A

    What Is Fog Computing With Example?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 15, 2022 at 9:31 pm

    Fog computing, also known as fog networking or edge computing, is a distributed computing infrastructure in which data, compute, storage and applications are hosted at the edge of the Internet near the source of data. For example, a fog computing system can be used to monitor the temperature of induRead more

    Fog computing, also known as fog networking or edge computing, is a distributed computing infrastructure in which data, compute, storage and applications are hosted at the edge of the Internet near the source of data. For example, a fog computing system can be used to monitor the temperature of industrial equipment at a manufacturing plant. Data from the sensors is collected and analyzed by the fog computing system, and any necessary actions are taken in real-time. The fog computing system eliminates the need for the data to be sent to a centralized cloud for processing.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  3. Asked: December 15, 2022In: Q & A

    What To Do If Your Email Has Been Hacked?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 15, 2022 at 9:29 pm

    1. Change your password: Immediately change your email password and make sure that you use a strong, unique password. 2. Check your security settings: Check your security settings to ensure that your account is secure and that there are no suspicious activities or logins. 3. Enable two-factor authenRead more

    1. Change your password: Immediately change your email password and make sure that you use a strong, unique password.

    2. Check your security settings: Check your security settings to ensure that your account is secure and that there are no suspicious activities or logins.

    3. Enable two-factor authentication: Enabling two-factor authentication will add an extra layer of security to your account, making it much more difficult for hackers to gain access.

    4. Scan your computer for malware: Use an anti-malware program to scan your computer for any malicious software that may have been installed by the hacker.

    5. Monitor your email for suspicious activity: Check your emails for any suspicious emails, messages, or changes to your contact list.

    6. Contact your email provider: Contact your email provider and inform them of the hack. They can help you secure your account and reset your password.

    7. Consider a credit freeze: If you think your personal information has been compromised, consider placing a credit freeze on your accounts.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  4. Asked: December 15, 2022In: Q & A

    What Can You Do With Putty Software?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 15, 2022 at 9:27 pm

    Putty is a popular and powerful SSH (Secure Shell) and telnet client for Windows. It can be used to provide secure remote access to systems over the internet, with features including secure file transfer, X11 forwarding, port forwarding, and agent forwarding. Putty can also be used to connect to a lRead more

    Putty is a popular and powerful SSH (Secure Shell) and telnet client for Windows. It can be used to provide secure remote access to systems over the internet, with features including secure file transfer, X11 forwarding, port forwarding, and agent forwarding. Putty can also be used to connect to a local serial port, allowing it to be used for various tasks such as controlling routers and modems, debugging hardware, and connecting to embedded systems.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  5. Asked: December 15, 2022In: Q & A

    How To Mute Zoom Audio Output Mac?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 15, 2022 at 9:25 pm

    1. Open System Preferences. 2. Select the Sound preference pane. 3. Click the Output tab. 4. Select the Internal Speakers option from the list of available output devices. 5. Uncheck the Mute box to unmute the sound. 6. Open the Zoom app. 7. Click the Audio button in the lower-left corner of the ZooRead more

    1. Open System Preferences.
    2. Select the Sound preference pane.
    3. Click the Output tab.
    4. Select the Internal Speakers option from the list of available output devices.
    5. Uncheck the Mute box to unmute the sound.
    6. Open the Zoom app.
    7. Click the Audio button in the lower-left corner of the Zoom window.
    8. Select the Speaker option and select None from the drop-down menu.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  6. Asked: December 15, 2022In: Q & A

    How To Open Bundle File In Mac?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 15, 2022 at 9:23 pm

    Bundle files on Mac are typically application packages, or collections of files and data related to a particular program. To open a bundle file, simply double-click it in the Finder. If it is an application, it will open as normal. If it is a folder or a collection of files, it will open in the FindRead more

    Bundle files on Mac are typically application packages, or collections of files and data related to a particular program. To open a bundle file, simply double-click it in the Finder. If it is an application, it will open as normal. If it is a folder or a collection of files, it will open in the Finder.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  7. Asked: December 15, 2022In: Q & A

    How To Enable Shadow Copy Server 2016?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 15, 2022 at 7:48 pm

    1. Open the Server Manager and click on File and Storage Services. 2. Select the Volumes tab. 3. Select the volume you want to enable Shadow Copy on and click on the Properties icon (the gear). 4. Select the Shadow Copies tab. 5. Click on the Enable button. 6. Select the desired schedule for the ShaRead more

    1. Open the Server Manager and click on File and Storage Services.
    2. Select the Volumes tab.
    3. Select the volume you want to enable Shadow Copy on and click on the Properties icon (the gear).
    4. Select the Shadow Copies tab.
    5. Click on the Enable button.
    6. Select the desired schedule for the Shadow Copies to be created.
    7. Select the desired storage location for the Shadow Copies.
    8. Click on the Apply button.
    9. Click on the OK button to close the Properties window.
    10. You will now see the Shadow Copies listed on the Shadow Copies tab.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  8. Asked: December 15, 2022In: Q & A

    How To Tap Into Fiber Optic Cable?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 15, 2022 at 7:17 pm

    To tap into a fiber optic cable, the first step is to locate the cable and identify the type of connector used on the cable. Next, cut the cable, being careful to avoid damaging the strands of the cable. Depending on the type of connector used, you may need to carefully strip away some of the protecRead more

    To tap into a fiber optic cable, the first step is to locate the cable and identify the type of connector used on the cable. Next, cut the cable, being careful to avoid damaging the strands of the cable. Depending on the type of connector used, you may need to carefully strip away some of the protective covering to expose the strands of the cable. Then, attach the connector to the cable, making sure to follow the manufacturer’s instructions. Finally, connect the other end of the cable to the device or network you wish to access.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  9. Asked: December 15, 2022In: Q & A

    How To Report a Hacked Yahoo Email Account?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 15, 2022 at 7:15 pm

    If you believe your Yahoo account has been hacked, you should immediately take action to protect your account and personal information. 1. Change Your Password: The first step you should take is to change the password for your Yahoo account. Make sure your new password is strong and contains a mix oRead more

    If you believe your Yahoo account has been hacked, you should immediately take action to protect your account and personal information.

    1. Change Your Password: The first step you should take is to change the password for your Yahoo account. Make sure your new password is strong and contains a mix of numbers, letters, and symbols.

    2. Contact Yahoo Support: You should contact Yahoo support to report the issue and let them know what has happened.

    3. Check For Suspicious Activity: Check your account for any suspicious activity, such as emails sent or received, contacts added, or changes to your account settings.

    4. Enable Two-Step Verification: You can also enable two-step verification for your Yahoo account to add an extra layer of security.

    5. Scan Your Computer: Scan your computer for any viruses or malware that could have been installed when your account was hacked.

    6. Monitor Your Credit: You should also monitor your credit reports and financial accounts for any suspicious activity. Contact your bank, credit card company, and any other financial institutions to check for any fraudulent activity.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  10. Asked: December 15, 2022In: Q & A

    What Do You Mean By Network?

    Disha Srivastava
    Disha Srivastava Bronze
    Added an answer on December 15, 2022 at 7:13 pm

    A network is a collection of computers, servers, mainframes, network devices, peripherals, or other devices connected to one another to allow the sharing of data, resources, and information. It allows communication and data sharing between connected devices. Networks can be local area networks (LANsRead more

    A network is a collection of computers, servers, mainframes, network devices, peripherals, or other devices connected to one another to allow the sharing of data, resources, and information. It allows communication and data sharing between connected devices. Networks can be local area networks (LANs), wide area networks (WANs), or a combination of the two.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
1 … 43 44 45 46 47 … 52

Sidebar

Top Members

Shailendra Yadav

Shailendra Yadav

  • 2k Questions
  • 52k Points
Level 50
Sneha Singh

Sneha Singh

  • 2k Questions
  • 41k Points
Level 40
Nilay Sharma

Nilay Sharma

  • 0 Questions
  • 33k Points
Level 30
  • Popular
  • Comments
  • Farwa Khalid

    Half Duplex Versus Full Duplex

    • 3 Comments
  • Farwa Khalid

    What Is Wireless Isolation?

    • 0 Comments
  • Farwa Khalid

    What Is Ping Spoofing

    • 0 Comments
  • Farwa Khalid

    What Is Radio Network Controller?

    • 0 Comments
  • Farwa Khalid

    What Is A Typical Symptom Of A CMOS Battery Failure?

    • 0 Comments
  • What is Circuit Switching - Network Classmate
    What is Circuit Switching - Network Classmate added a comment […] needs to be established. It is additive into two… November 30, 2022 at 11:36 am
  • Difference Between Router And Switch - Network Classmate
    Difference Between Router And Switch - Network Classmate added a comment […] router works in the full-duplex transmission mode. However, we… November 30, 2022 at 11:36 am
  • Communication Protocols - Network Classmate
    Communication Protocols - Network Classmate added a comment […] receiver. It is two wired protocols. Rx and Tx… November 30, 2022 at 11:35 am

  • Home
  • Groups page
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Communities
  • Polls
  • Tags
  • Badges




Footer

Important Links

  • Home
  • Article
  • Q&A
  • Guest Post

Useful Categories

  • Basic Networking
  • Basic Security
  • CCNA R & S
  • CCNA Security
  • Download

Legal Stuff

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • User Data Policy

Social Links

  • Facebook
  • Instagram
  • Twitter
  • Telegram
  • Linkedin

Copyrights © 2023 Network Classmate™. All Rights Reserved.
Designed by LeadsNut