Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In
Continue with Google
or use


Have an account? Sign In Now

Sign In

Continue with Google
or use

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Network Classmate Logo Network Classmate Logo
Sign InSign Up

Network Classmate

Network Classmate Navigation

  • Home
  • Article
  • Q&A
  • Guest Post
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Feed
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges

Maryam Khalid

Bronze
Ask Maryam Khalid
60 Visits
0 Followers
0 Questions
Home/ Maryam Khalid/Answers
  • About
  • Questions
  • Polls
  • Answers
  • Best Answers
  • Asked Questions
  • Followed
  • Favorites
  • Groups
  • Posts
  • Comments
  • Followers Questions
  • Followers Answers
  • Followers Posts
  • Followers Comments
  1. Asked: October 24, 2021In: Q & A

    What Is The Value Of Ans After The Following Code Has Been Executed?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on January 19, 2022 at 12:43 am

    What will be the value of ans after the following code has been executed? int ans = 10;  int x = 65;  int y = 55;  if (x >= y)  ans = x + y;  A) 10  B) 120  C) 100  D) No value, there is a syntax error.  None Answer: Option B 120 Explanation: The code consists of three variables ans, x, and y, anRead more

    What will be the value of ans after the following code has been executed?

    int ans = 10;

     int x = 65;

     int y = 55;

     if (x >= y)

     ans = x + y;

     A) 10

     B) 120

     C) 100

     D) No value, there is a syntax error.

     None

    Answer: Option B 120

    Explanation: The code consists of three variables ans, x, and y, and the values held by them are 10,65, and 55 respectively. If the variable x has a greater value than variable y, then if statement will run ans=x + y. The running of the statement will sum x with y ->65+55 and the already given value of ans is overwritten by the sum of the result which is 120.

    Conditional statement

    The purpose of the conditional statement is to decide based on the given conditions. in case of no condition, the conditional statement will automatically execute, And if some of the condition is present then the flow of execution is changed and the result is according to it and the whole process is known as the decision making. conditional statements have different forms such as:

    • If statement.
    • Else-if statement.
    • Switch statement.

    If statement

    The first condition of the operating system is the If statement. the syntax is easy it starts with IF followed by the braces and the condition which needs to be met is a place between the braces. the If condition works by checking whether the condition in the expression is true or false. If the answer is true then the statement runs otherwise it skips to another block.

    Syntax : if(condition) {}

    Example : if (today==Monday)

    {

    Cout<< “good morning”;

    }

    Else If statement

    Moreover, if condition checks only one condition but else if check multiple conditions .the else if have an almost same pattern such as if start and close with brace along with the condition, and the condition is not true then else if and the next result will display to the screen

    Syntax: if(condition)

    {}

    Else if(condition){

    }

    Example: if (today== “rainy”)

    {

    Cout<<” read at the home”;

    }

    Else if (today== “sunny”)

    {

    Cout<<” read in the library”;

    }

    Then else if check the condition from the start if the first condition is true then other ones will terminate and if it is false then the code moves to the second condition and continuously runs until the condition is true.

    Switch statement

    The switch statement makes the code more understandable rather than if, else if statements. The block is terminated by the break keyword in the switch statements. the statements in the switch are shown with the cases.

    Syntax: switch {condition)

    {

     case 1:

    break;

    case 2:

    break;

    default:

    break;

    }

    Example:

     Int today=2;

    Switch(today)

    {

    Case 1:

    Cout<<” read in the library”;

    Break;

     Case 2:

    Cout<<” read at home”;

    Break;

    Default:

    Cout<<” get some sleep”;

    }

    The switch statement runs till the true value is returned and the code is terminated with the break keyword. And in case of false the default statement will run.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  2. Asked: October 24, 2021In: Q & A

    Which Type Of Permissions Apply Only To Network Users And Work On Ntfs, Fat32, And Exfat Volumes?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on January 19, 2022 at 12:42 am

    Which type of permissions applies only to network users and work on NTFS, FAT32, and exFAT volumes? Answer: Share is the permissions that apply only to network users and work on NTFS, FAT32, and exFAT volumes. File system: The collective algorithm and the data structure work as the translator from tRead more

    Which type of permissions applies only to network users and work on NTFS, FAT32, and exFAT volumes?

    Answer: Share is the permissions that apply only to network users and work on NTFS, FAT32, and exFAT volumes.

    File system:

    The collective algorithm and the data structure work as the translator from the logical file operation to some actual storage of the data physically. The file system is used to store and retrieve the data. in the absence of the file system the information will place in the pile-up form there is no evident sequence of the storage and we won’t be able to determine where the one information start and the next one ends.

    Now that you have learned about the file system lets take a look at the difference between the NTFS, FAT 32, and exFAT described below:

     NTFS

    The newest technology file system (NTFS) is the advanced file system which is set as by default in Windows when it is installed on laptops or PC. It can automatically format the system drive with the NTFS. The file system has the size of the file and partition limit that you don’t have to worry about the space in the future.

    Windows XP is the first in which NTFS is first introduced. It can handle the file authority for security, modify the journal which permits to recover of files in case of damage, shadow the backup copies.

    FAT32

    FAT32 is the oldest file system present in windows. At first, it was debuted in windows 95 by replacing the FAT16 file system which works with the previous operating system such as MS-DOS and Windows 3.

    The maximum size of the individual file on the FAT 32 cannot be more than 4GB. the partition of the FAT32 has to be less than 8 Terabytes (TB). The file allocation table has only 4 bytes for each cluster.

    exFAT

    Though exFAT was introduced in 2006 it was added to the older windows version along with the updates in the Windows XP and Windows Vista OS. the, most updated file system in the Microsoft and Windows operating system is exFAT.the file system adjusts along with the flash drive, thumb drive, and memory cards. ExFAT stands for the extended file system, the file and partition size limit are very large .it is optimized for the flash drive.

    The key difference between the file system is described in the following:

    • FAT32 was introduced in Windows 95, exFAT was debuted in Windows XP and Windows Vista OS. While the NTFS was present in windows NT but mostly it is used after windows XP.
    • FAT32 format is easy and understandable. exFAT is comfortable with a flash drive. NTFS supports the quota limits. encryption, permission for files, etc.
    • FAT32 works with windows, MAC, and Linux. while exFAT and NTFS work with only windows versions.
    • FAT32 max file size is 4GB while the partition size is 8TB.exFAT has not to limit to the file size and partition limits. NTFS has no specific limits.
    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  3. Asked: October 24, 2021In: Q & A

    Which Statement Best Describes A Diagnostic Label?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on January 19, 2022 at 12:42 am

    Which statement best describes a diagnostic label? The condition which response to the interruption of the nursing. It shows the effect of the client's response to a health condition. The characteristics of the client's response to health conditions are described by it. It is identified from the cliRead more

    Which statement best describes a diagnostic label?

    • The condition which response to the interruption of the nursing.
    • It shows the effect of the client’s response to a health condition.
    • The characteristics of the client’s response to health conditions are described by it.
    • It is identified from the client’s assessment data and associated with the diagnosis. 

    Answer: The diagnostic label identified from the client’s assessment data and associated with the diagnosis. The diagnostic label is approved by the NANDA-I and it is the name of the nursing diagnosis.it also describes the effect of the client’s response to a health condition in a simple word. it is the condition that responds to the intervention of the nursing. All NANDA-I-authorized diagnoses have a definition that describes the traits of the client’s reaction to fitness conditions. The associated component of a nursing prognosis is recognized from the client’s evaluation records and related to the prognosis.

    With the help of the present diagnostics, health care assigns diagnostic labels to categorize the treatment and the research purpose for individuals.it permits the physician and the researcher to think that all members of the group are homogenous in the present nature of the illness, without any worry that there is some variation in the presentation of the signs or symptoms which cover the illness onset.

    Simply the diagnostic labels separate the groups of the individual groups according to the set of defined boundaries. The label has various purposes such as it gives the methods for the physicians and the researchers to understand the huge amount of the information.it also has the mean for describing the individual who has the notifiable symptoms and may have the expected course and forecast. The label suggests the analysis and pins the wat toward the specific interruption which might keep the result of the condition.

    The pros of the diagnostic label are that it gives the information and acts as a cue to signal cliché. The negative result of the diagnostic label gives the way for the two social psychological processes. When someone is diagnosed with a disorder the ideas which arise with such mental illness become relevant to the person itself and the negative thoughts become to develop of self. the personal mean change to the expectation of rejection and it initiates the defensive behavior which aimed to keep from that rejection. One such conduct can be a reluctance to find out about or take part in studies research in order to keep away from the stigma related to the diagnostic labels. Below, we overview the idea of stigma and talk about how behavioral manifestations of stigma affect the lives of people identified with dementia.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  4. Asked: October 24, 2021In: Q & A

    What Term Best Represents The Resiliency Of A Cryptographic Key To Attacks?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on January 19, 2022 at 12:42 am

    What term best represents the resiliency of a cryptographic key to attacks? Bits of the key. The resiliency of key. Key strength. Keyspace. Answer: key strength best represents the resiliency of a cryptographic key to attacks. Cryptography gives secure communication in the presence of the third persRead more

    What term best represents the resiliency of a cryptographic key to attacks?

    • Bits of the key.
    • The resiliency of key.
    • Key strength.
    • Keyspace.

    Answer: key strength best represents the resiliency of a cryptographic key to attacks.

    Cryptography gives secure communication in the presence of the third person .it is considered as the method for secure communication which only permits the sender and the receiver to see the actual data which is transferred among them. It is related to encryption because the plain text is transferred to the unreadable form which is called ciphertext and the key is the element that unlocks the encryption process. The cryptographic techniques for the obstruction of the image are merging etc.

    During the electronic communication of the data the cryptography encrypt and decode or decrypt the email; and another kind of plain text. Cryptography uses the secret key which is also called an asymmetric key, its work is to encrypt the data, and along with the message the key is sent toward the recipient which in turn used the secret key and decodes the actual content and read it.

    Another asymmetric system is established in it both the sender and the receiver has key one is a public key which is present in the receiver which is requested by the sender and encrypt the message and send the key together when the message arrives the private key of the recipient and decrypt the message, and the theft has no use of the data without the private key.

    Types of cryptography are described in the following:

    Symmetric key: in this type, the public key is present at both ends: sender and receiver. the sender encrypts the message with the public key and sends it toward the recipient .while the recipient again uses the public key and decodes the ciphertext and reads the message.

    Public key: The concept is revolving for the past hundreds of years in these methods the public key and private key are present. The public key as the name indicates is public and free distributed while the private key is associated with it. The public key encrypts the message and the private key responsible for the decryption.

    Hash function: In this technique, no key is used. a constant length of the hash value is evaluated according to the plain text which makes the plain text difficult or impossible to recover .most of the operating system use the hash function for password encryption.

    Best protective measure 

    Some of the protective measures are discussed below:

    • The message has to be encrypted before the transferal of the message and mostly uses the public key method.
    • Sensitive data like the images, personal record bank detail, etc need to be encrypted at any cost.
    • Use an algorithm that is easy to understand and implement.
    • The measure helps in the protection of the data if the device is lost and went into the wrong hands.
    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  5. Asked: October 24, 2021In: Q & A

    Why Did Pc-B Receive The Global Routing Prefix And Subnet Id That You Configured On R1?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on January 19, 2022 at 12:42 am

    Why did PC-B receive the Global Routing Prefix and Subnet ID that you configured on R1? Answer: on R1 the IPv6 is part of the all-router multicast group, FF02::2 permits it to send the RA (router advertisement) messages along with global network address and the subnet ID information to the nodes onRead more

    Why did PC-B receive the Global Routing Prefix and Subnet ID that you configured on R1?

    Answer: on R1 the IPv6 is part of the all-router multicast group, FF02::2 permits it to send the RA (router advertisement) messages along with global network address and the subnet ID information to the nodes on the LAN. R1 can send the link-local address, fe80::1 as the default gateway. For as long the prefix length is 64 bits the PCs will receive the IPv6 addresses and the default gateway through SLAAC.

    The global routing prefix is described as the value which is allocated to the site while the subnet ID act as the identifier for the link of the site. For the determination of the Interface link, an Interface ID is present, it is also needed to be unique for the prefix of the subnet.

    Except for form the global unicast which initiate with B’000’ consist of the 64-bit interface ID field (n + m=64) while the other one with B’000’ have no constraints on the length of the structure of the interface ID field.

    For example global unicast addresses that begin with B’000′ are IPv6 deal with embedded IPv4 addresses. These consist of IPv4-mapped IPv6 addresses and IPv4-well-matched IPv6 addresses.

    The global unicast is divided into three parts such as :

    • Global routing prefix.
    • Subnet ID.
    • Interface ID.

    Global Routing Prefix

    Global routing prefix is allocated by the provider as ISP to the customer site. Recently RIRs allocate a/48 global routing prefix to the user. The customer varies from the enterprise to the household which is enough for the customers.

    For example an IPv6 address 2001:0DB8: ACAD: :/48 contain a prefix that describes the first 48 bits (3 hextets) (2001:0DB8: ACAD) as the prefix part of the address. while the double colon which presents before /48 shows the other part of the address contains all 0’s.

    Subnet ID:

    The ID is for a determination of the subnet in the site by the organizations.

    Interface ID:

    The interface ID of IPv6 same as the host part of the IPv4 address. the term is used due to a single host might have multiple interfaces, with more than one IPv6 address.

    The sixteen bits of subnet ID permit every web website online sizable flexibility in growing subnets that mirror the web website online’s community structure. For example: 

    • A smaller company can simply set all of the bits withinside the Subnet ID to 0 and feature a “flat” inner structure.
    • A medium-sized company may want to use all of the bits withinside the Subnet ID to carry out the equal of “straight” subnetting below IPv4, assigning a distinctive Subnet ID to every subnet. There are sixteen bits here, so this lets in a whopping 65,536 subnets.
    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  6. Asked: October 24, 2021In: Q & A

    Which Part Of The Motherboard In Your Computer Is Used To Store Encryption Keys And Certificates?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on January 19, 2022 at 12:42 am

    Which Part of The Motherboard in Your Computer Is Used to Store Encryption Keys and Certificates? CPU UEFI GPU TPM Answer: TPM is the piece of the hardware on a computer motherboard that generates encryption keys and certificates. A trusted platform module (TPM) is the chip of PC which can stronglyRead more

    Which Part of The Motherboard in Your Computer Is Used to Store Encryption Keys and Certificates?

    • CPU
    • UEFI
    • GPU
    • TPM

    Answer: TPM is the piece of the hardware on a computer motherboard that generates encryption keys and certificates. A trusted platform module (TPM) is the chip of PC which can strongly store artifacts. The artifacts contain password encryption keys and certificates.

    What is TPM?

    A chip on the personal computers which contain keys, certificates and it is dedicated processor. Without the part of the key, you can’t able to decode data on your device and utilize the services.in the new windows, 11 TPM is advanced and store the biometric data to open the window and the piece of the key for bit lockers.

    TPM performs many functions in spite it is password certificates it can store any part of the information which can decrypt the message. The data is stored on hardware rather than the software which means the threat or bugs in the software can’t disclose the data hidden in the TPM.

    With the involvement of endorsement key certificate, TPM security level increases’ certificate is located on module and firm. Along with the verification of it, the function communicating with the TPM is interacting with TPM.

    Simply put TP protects the data which causes us drastic damage. Moreover, the device is located on the motherboard it does not require any authentication to interact with any server. This device is useful in case you need to prove who you are and the laptop or PC is your own not anyone else.

    Works of TPM

    TPM performs many functions some of them are listed below:

    • Not all but few data are transferred in an unencrypted form in the form of plain text. TPM uses the combination of hardware and software to secure the password and encryption keys during the time of unencrypted form.
    • TPM can start the quarantine mode if the bug, virus, or malware attack on the system has begun and solved the problem.
    • Few chrome books along with TPM and start-up processes can check the BIOS for any kind of unauthorized modification.
    • Or the login in an account TPM stores the encryption keys, certificates, and passwords on the hardware rather than the software for security concerns.
    • It can enable digital management so that the media companies can distribute the information without any worry of the theft hacking to the system.

    When you can buy the PC integrated with a TPM chip it is used in a way that encryption protects the sensitive data by accessing the BIOS.in the IT field TPM use in the enterprise devices. Laptop companies as Dell, HP use software apps that give them access to use TPM features.

    The TPM version in your PC is checked in the following method:

    • Press the window key along with R to display the Run dialog box.
    • Write the command “tpm. msc” and press enter.
    • The TPM management screen will display if the TPM chips are present in your PC along with other details.
    • If the TP is not present then the message will show and tell you about it.
    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  7. Asked: October 24, 2021In: Q & A

    Which Of The Following Statements About Fiber-Optic Cable Is Not True?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on January 19, 2022 at 12:42 am

    Which of the following statements about fiber-optic cable is not true? The speed for data transmission is faster than a coaxial or twisted pair cable. It is thin in weight and lighter as compared to coaxial cable or twisted pair cable. The security is better than coaxial cables. The telecommunicatioRead more

    Which of the following statements about fiber-optic cable is not true?

    • The speed for data transmission is faster than a coaxial or twisted pair cable.
    • It is thin in weight and lighter as compared to coaxial cable or twisted pair cable.
    • The security is better than coaxial cables.
    • The telecommunication companies invest in the country’s fiber optics system in the past decades.

    Answer: The statement which is true about the fiber-optic cable is that its server has better security than the coaxial cables.

    What do you know about fiber optic cables?

    The fiber optic cable in the plastic case comprises of few to hundreds of optical fibers, also called the optics cable. The data transfer in the form of the light or waves and speed is much more than any traditional cables as coaxial cables etc. Because of its structure, the electromagnetic interference does not affect the fiber optic cables, it does not cause spark because the signal is not in the form of electrons or electricity. The part of the fiber optics cable is described in the following:

    1. Core: the core is present at the center of the fiber optics cable whose work is to transfer light signals which are formed from a light-emitting diode (LED). The size of the core varies from 8.3 or 9µm for single-mode but in multimode, it is 50 to 62.5µm.
    2. Cladding: cladding is for reflecting the light into the core and it is located outside of the core surrounding it which makes the light waves move in the length of the fiber.
    3. Primary coating: primary coating work in the absorption of the shocks, keep the excessive bending, and also reinforce the fiber core.

    What are the types of fiber-optic cable?

    The main types of fiber-optic cable are two which are described below:

     Multimode fiber-optic cables:

    Multimode fiber-optic cable work by containing various rays at the same time with different properties at the core; eventually the light covering the shortest path move slowest. Dispersion case in multimode limits the range that’s why it is only used for less than a kilometer distance. the multimode has two core sizes one is 62.5 and the other is 50 microns.

    Single-mode fiber-optic cable:

    The single-mode core is less in size than multimode for about 9 microns and able to travel more than multimode up to 100km.it is used in LAN, cable TV, and many apps.

    Pros and cons of fiber-optic cables

    Pros:

    • The length of the fiber-optic is large than copper twisted-pair cables.
    • Offer larger bandwidth.
    • As light travel from it then there is no electromagnetic interference.
    • It offers higher security than other cables.
    • It is lighter in weight while the size is thin related to other cables.

    Cons:

    • Fiber optic cable is made of glass then it is difficult to bend, because a lot of data may lose during it.
    • Fiber optics can be damaged because of their structure.
    • It is expensive because it needs a specialist who can handle it efficiently.
    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  8. Asked: October 24, 2021In: Q & A

    Which Of The Following Would Be Considered A Vulnerability?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on January 19, 2022 at 12:41 am

    Which of the following would be considered a vulnerability? Degradation in performance of the website. A sudden drop in a stock price. Files aren’t scanned for malware. Payroll information. Privilege level abuse. Answer:  Files that aren’t scanned for malware are the vulnerability in the given optioRead more

    Which of the following would be considered a vulnerability?

    • Degradation in performance of the website.
    • A sudden drop in a stock price.
    • Files aren’t scanned for malware.
    • Payroll information.
    • Privilege level abuse.

    Answer:  Files that aren’t scanned for malware are the vulnerability in the given option.

    What is vulnerability?

    Vulnerability is the point of weakness where you can get attacked by something. There are many forms of vulnerabilities. In our house not having the bars or the security alarm is a vulnerability. Because of this an unknown person can easily enter our home and cause damage.it is a threat to our protection. 

    Some other examples are listed below:

    • A door without the locks system.
    • Lack of security alarms, cameras.
    • A defect in the firewalls allows the hacker to enter into our system.

    These all are the vulnerability that hurt or damage your business and many other important assets. Let’s discuss the vulnerability in information security in the following section:

    In the computer system, vulnerability is the weakness that permits the hackers to get into the system and cause disturbance or loss of important information. every system is suspect to vulnerabilities. Along with the advancement of technologies a chance of vulnerability is also rise as millions of codes, human errors, many developers, etc. most of the time vulnerability happens due to the hardware, software, and procedural activities.

    Hardware vulnerability:

    Vulnerability in the hardware is the weakness that is used to attack the hardware either physically or logically. Some of the examples are:

    • Delaying in the updates.
    • Wek storage system.
    • Unencrypted devices.

    Software vulnerability:

    A vulnerability in the software occurs due to problems in the development, installments, or configuration and it can also affect the security policies.

    Examples:

    • Lack of the validation of input.
    • Cross-site scripting
    • Data without encryption.
    • Uploads without verification.

    Vulnerability in a network:

    A vulnerability in the network occurs because of both hardware and software. an example of a network vulnerability are:

    • Communication without any protection.
    • Malware or other threats as worms, bugs, viruses.
    • Social engineering attacks.
    • Firewalls misconfigurations.

    Procedural vulnerability:

    A weakness in the methods of organization operations. For examples:

    • Password process: password should be implemented according to the standard policy.
    • Training procedure: a company worker should be aware of the process as to what to do in a certain scenario or how to manage the security. employees should not be asked for an online credential for users. They should be well aware of the phishing threats etc.

    How vulnerability helps hackers?

    Attacks develop malicious programs and implement them in the system which helps them to take advantage of the vulnerability to get into the target network. They have an exploits kit which is like a set of lockers that can easily open any vulnerable system. it is common for hackers to use it to infect the computer with a malware threat. A vulnerability in windows is common for malware attacks into the system.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  9. Asked: October 24, 2021In: Q & A

    What Should You Do After A Problem Has Been Resolved At An On-Site Service Call?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on January 19, 2022 at 12:41 am

    What Should You Do After a Problem Has Been Resolved at An On-Site Service Call? Answer: If you think the problem is fixed then tell the client that the job is finished and move toward other. Memory errors are difficult to identify because they occur periodically and be mistaken with another kind ofRead more

    What Should You Do After a Problem Has Been Resolved at An On-Site Service Call?

    Answer: If you think the problem is fixed then tell the client that the job is finished and move toward other. Memory errors are difficult to identify because they occur periodically and be mistaken with another kind of error.

    What is an onsite service?

    Onsite services define as the trained technician giving the services to the place where the client is located. And the customer needs to be sure that needed equipment should be present for the services at exact times. There is an offsite service as well. let’s take a look at the difference between the onsite and the offsite services.

    Comparison between onsite and offsite services

    If the issue happens in the system or network the IT service provider gives the services both onsite and offsite. Does a question arise what is the difference between them?

    Offsite services 

    IT manager gives the offsite services which help both the client and the service provider, it is also known as remote or online support. They are mostly videos, email, online chats, etc. Along with the help of offsite services the dealer might connect to a system r network automatically to deal with the issues. A remotely connected software’s are Go To assist log me in are needed and they should be installed locally.

    The services of the offsite are described in the following:

    Instant support:

    The provider must support you regardless of your location. most of them give free email support and a live chat. Phone support is the main one, the plans are premium for the company but you can call them anytime.

    Privacy:

    The offsite services are most secure because there is no need for the technician to come to your premises.

    Support on time:

    The manager a lot of team members, which helps to solve the problem in time, if we can’t solve the problem, other members will solve it for you

    Convenience

    Off-site web page assist is quicker as technicians do now no longer want to journey in your premises. They can surely provide steerage or hook up with your laptop or community remotely to restore your problems.

    Onsite support

    Onsite support as the name indicates will provide the services at your place .it is usually when the off-site services are not able to provide or the user is a bit sensitive toward a system. The onsite support is time-consuming and expensive. but it has the benefit that the technician will check your system by himself rather than on a live chat.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  10. Asked: October 24, 2021In: Q & A

    What Is The Subnet Address For The Ipv6 Address 2001:D12:Aa04:B5::1/64?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on January 19, 2022 at 12:38 am

    What is the subnet address for the IPv6 address 2001: D12:AA04: B5::1/64? D12:AA04 2001: D12. D12: :/64. 2001: D12:AA04: B5: :/64. Answer: In the address /64 shows the network and the subnet IPV6 field which is represented as the first four groups of the hexadecimal digits. While the remaining partRead more

    What is the subnet address for the IPv6 address 2001: D12:AA04: B5::1/64?

    • D12:AA04
    • 2001: D12.
    • D12: :/64.
    • 2001: D12:AA04: B5: :/64.

    Answer: In the address /64 shows the network and the subnet IPV6 field which is represented as the first four groups of the hexadecimal digits. While the remaining part of the address within the range is the subnetwork address 2001: D12:AA04: B5: :/64.

    What is the subnet address?

    A subnet is the distributed piece of the larger network. simply, the subnet is the division of the IP network into various small segments of the network in a logical manner. IP is the way to transfer data from one computer to another through the help of the internet. Every pc is associated with the specific IP which helps in the identification of the system when someone sends the data.

    A subnet is for the partition of the large data network into small pieces for an efficient subnetwork. This helps to reduce network traffic, which saves you from taking unnecessary routes and also helps to increase speed.

    Working of the subnets

    The subnet permits the devices connected with it to make the connection with each other’s on the other hand the routers make the connection among two subnets. The subnet size depends on the requirements for the connection. A point-to-point is for the connection between two devices and the data center subnet is for the connection between multiple devices.

    The organization can determine the number and the size of created subnets held within the limits of address space it uses. The subnet detail is local to that organization. in the IP network, the subnet uses the host ID part field for identifying individual subnets. Such as the group 172.16.0.0 network is for the subnet ID. the subnet mask work by finding the portion of the IP address which must be used as the subnet ID.

    The subnet mask implemented on the full network address with the help of the binary AND operation the output of the AND operation is only true when both inputs are true. If both bits are 1 then it gives the result of subnet ID. the best possible route between the subnetwork is determined with the help of the subnet ID .when the packets arrived at the router then the packet is addressed to host on a distinct subnet as compared to the sender host such as host A to host C the host A knows the subnet mask and use to identify the subnet ID of the host C.it also check the routing table of class c to identify the interface which is connected to C subnet and move the packet to that interface.

    Uses of the subnet

    The subnet uses for many possible things and some of them are listed in the following:

    • Reassign the IP address.
    • Relieving the network congestion.
    • Enhance the network security
    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
1 … 15 16 17 18 19 … 29

Sidebar

Top Members

Shailendra Yadav

Shailendra Yadav

  • 2k Questions
  • 52k Points
Level 50
Sneha Singh

Sneha Singh

  • 2k Questions
  • 41k Points
Level 40
Nilay Sharma

Nilay Sharma

  • 0 Questions
  • 33k Points
Level 30
  • Popular
  • Comments
  • Farwa Khalid

    Half Duplex Versus Full Duplex

    • 3 Comments
  • Shailendra Yadav

    Troubleshooting with TR-069 ACS for ISPs 

    • 0 Comments
  • Farwa Khalid

    What Is Ping Spoofing

    • 0 Comments
  • Farwa Khalid

    What Is Wireless Isolation?

    • 0 Comments
  • Farwa Khalid

    What Is Radio Network Controller?

    • 0 Comments
  • What is Circuit Switching - Network Classmate
    What is Circuit Switching - Network Classmate added a comment […] needs to be established. It is additive into two… November 30, 2022 at 11:36 am
  • Difference Between Router And Switch - Network Classmate
    Difference Between Router And Switch - Network Classmate added a comment […] router works in the full-duplex transmission mode. However, we… November 30, 2022 at 11:36 am
  • Communication Protocols - Network Classmate
    Communication Protocols - Network Classmate added a comment […] receiver. It is two wired protocols. Rx and Tx… November 30, 2022 at 11:35 am

  • Home
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges




Footer

Important Links

  • Home
  • Article
  • Q&A
  • Guest Post

Useful Categories

  • Basic Networking
  • Basic Security
  • CCNA R & S
  • CCNA Security
  • Download

Legal Stuff

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • User Data Policy

Social Links

  • Facebook
  • Instagram
  • Twitter
  • Telegram
  • Linkedin

Copyrights © 2023 Network Classmate™. All Rights Reserved.
Designed by LeadsNut

Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}