Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
What Is Fiber Optic Cable Made Of?
What Is Fiber Optic Cable Made Of? Answer: Fiber optics cable consists of the glass fiber this strands whose size is about 8 microns which is less in size than the human hair. The digital information is encrypted or on the light pulse for data transmission. Its speed of it is the speed of light whicRead more
What Is Fiber Optic Cable Made Of?
Answer: Fiber optics cable consists of the glass fiber this strands whose size is about 8 microns which is less in size than the human hair. The digital information is encrypted or on the light pulse for data transmission. Its speed of it is the speed of light which is 186000 miles per sec.
The core of the fiber optics is this glass strand which is almost equal to the human hair that exists at the center of the cable and the transmission medium from where the light signal is transmitted. The core is covered by the cladding a layer whose work is to reflect the light back into the core. The combination of the core and the cladding is called the fiber.
On the fiber core, there is the trademark Kevlar which is a strong synthetic material that is used as the outer sheath for the protection of the glass fiber core. When the cable is pulled the tensile strength of it protects it from external damage. On the outer side of the Kevlar, there is a cable jacket that covers the outer oration of the cable, mostly it is a rise which is the rubber plastic a soft PVC, the surrounding environment tells which jacket type is suitable.
The boot of the cable is the next part aplastic rubber part that initiates the cable to the connector transition. Its work is to provide support for the cable that bends easily when it leaves the connector, keeping it from breaking, kind, or any kind of strain on it. The connector is the part that uses in the plugin. It’s like the locking method like a tab, the part that the user grabs to plug in or plug out the cable.
The ferrule is the piece of the connector that is mostly ceramic, plastic, or the strain-free steel and makes the fiber cable ends in an accurate alignment for the interconnection with the optics transceiver .fiber cable is inside the ferrule and sealed with the epoxy, that protects it from the contamination and makes is a string for a long time. The ferrule is costly and if there is a mistake in the length, hole the diameters either for inside or outside is not correct the connection will become weak.
See lessWhat Does Sent With Echo Mean?
What Does Sent with Echo Mean? Answer: Amazon has discovered the advanced technology in which one can send text messages to others with the Echo device. It means the echo user sent messages to anyone through voice, not just those who have an echo device. If you want to send a message with the help oRead more
What Does Sent with Echo Mean?
Answer: Amazon has discovered the advanced technology in which one can send text messages to others with the Echo device. It means the echo user sent messages to anyone through voice, not just those who have an echo device.
If you want to send a message with the help of the Amazon Echo, Alexa assists by sending and receiving the voice both on the android and IOS. The process is just asking Alexa to send the message and say what you want to say and when you receive the message in return you hear the sound and also the yellow light shows on the device. Let’s see the process to send the echo message through Alexa app in the following:
Alexa “send message”:
The echo message occurs through both the echo enables devices and the Alexa app. At first sign in for Alexa-to-Alexa calling. Get an iPhone 9.0 or greater version or an Android phone with version 5 or greater. On the Alexa app on your phone click on the conversation icon.in case you are not registered, it will ask to confirm the name and phone number so that it can check the contact list who have the Alexa app and are also registered for the messaging.
Ensure that the notification is on in order to receive the messages from papas Alexa to send the message, then it will ask for the receiver’s name. In the app select the name. After Alexa asks for the message you want to send just tell it to Alexa or Alexa can also choose the receiver, when you are finished Alexa will send it.
Play message:
The contact who has an Echo will get the notification for the message in the echo to enable the device. When the message aper you will chime and then the yellow light also appears on the Echo device. To see the message ‘Alexa play message’ Alexa asks if you want to hear it just say and Alexa plays it. On the Alexa app on your phone, you can get a notification. Click on the message, then tap on the play button to play it.to give the response, tap on the microphone icon and then reply.
See lessCoaxial Cable Is What Is Used For Home Telephone Service.?
Coaxial Cable Is What Is Used for Home Telephone Service? Answer: Coaxial cables are used by most telecommunications companies such as national telephone services ISP (Internet Service Provider), and cable TV operators for data transfer, e.g. video, and audio to their respective customers. The commRead more
Coaxial Cable Is What Is Used for Home Telephone Service?
Answer: Coaxial cables are used by most telecommunications companies such as national telephone services ISP (Internet Service Provider), and cable TV operators for data transfer, e.g. video, and audio to their respective customers. The common use of coaxial cables is in homes.
Coaxial cable is made up of a metal shield along with other elements that prevent the interference of signals. The television Cable operators use it to provide satellite connectivity to their customers either in homes or offices so they can utilize the facilities. Telephone companies use it to connect to telephone poles closest to customers. Some other companies use it but its use as the source for the Ethernet connection in the data centers or the large organizations is replaced with the implementation of the twisted pair cables.
Coaxial cables are named because they have the physical channels carrying signals and after insulated layers, they cover with other physical channels and run around the same axis. The outer channel is the ground layer, most cables or pipes can also be used with a single outer jacket as well as repeaters carrying a greater distance.
The cable is discovered by an English engineer. on the basis of the carrier is used and other elements, twisted-pair copper wires, fiber optics, as an alternative to coaxial cables
Coaxial cables are used in most organizations, homes, and businesses. Some of their uses are listed below:
What Is Wps On My Modem?
What Is Wps on My Modem? Answer: WPS stands for Wi-Fi Protected Setup which is built into most routers and makes the easy connection of the WIFI devices with a secure and reliable network(wireless). WPS is the simple technique for the reliable connection among modems, routers, and various WIFI enablRead more
What Is Wps on My Modem?
Answer: WPS stands for Wi-Fi Protected Setup which is built into most routers and makes the easy connection of the WIFI devices with a secure and reliable network(wireless).
WPS is the simple technique for the reliable connection among modems, routers, and various WIFI enables devices with less effort. It can work just to press the button that exists on the modems. The WPS button is paced on modems same as the routers. Mostly it is on the backside of between the ports, that’s why there is less or no chance that someone presses it by mistake. When you try to connect, watch carefully so that no disturbance occurs.
Some of the WPS buttons are on the front side of the modems to make them visible. Still, if someone has difficulty finding it they see the manual that contains instructions. The WPS establishes the connection using the wireless key between the modems and the device.
WPS configuration:
The configuration of the WPS is described in the following, but it might be a little different for some of the modems just because of their models:
What Is The Purpose Of a Server In a Network?
What Is the Purpose of a Server in a Network? Answer: The server function is to facilitate the resources, information, and services to the computer which is referred to as a client computer in a network. The computer when sharing the resources with the clients is known as the server. In the early stRead more
What Is the Purpose of a Server in a Network?
Answer: The server function is to facilitate the resources, information, and services to the computer which is referred to as a client computer in a network. The computer when sharing the resources with the clients is known as the server.
In the early stages of building servers, they are able to handle multiple users and programs running on a system. However, with virtualization, it is just the general server that is used for some reasons. With the advanced technology that makes the changes in the computers. today’s computer is capable enough to work as a network server. In an enterprise, there is little use of the server which is only done through the network server. The server role is similar to its type to share the resources but the network server might be confused with the file server.
During the work with the sensitive data or the application on your system, the file saving is the initiation, but what happens when you lost access to the system? A network server can handle it by containing the files and information in a network and allowing access for real-time use.
The network users can have the access to store data in a network and also provide collaboration among users. Different users are allowed to do the modification in the same programs while working on a project. Through the login details, the user makes the connection with the home network.at some point in the business, just email and a local disk are not enough for storage. The best possible solution is to have a central place where all the files are stored and share the resources with other devices like the printers.
The network server has services that can be utilized by remote users. They are listed in the following:
What Does Factory Resetting Router Do?
What Does Factory Resetting Router Do? Answer: Resetting will delete all the customized settings. The username and password for the router are set to the default values. The WiFi password and the username that you customized are also removed with factory resetting of the router. Sometimes people migRead more
What Does Factory Resetting Router Do?
Answer: Resetting will delete all the customized settings. The username and password for the router are set to the default values. The WiFi password and the username that you customized are also removed with factory resetting of the router.
Sometimes people might get confused and though that factory resetting and the reboot are the same things. The restart job is just to turn off the router and start over where it left off and have all the backups for the router.
The factory reset will delete all the router details such as the username, and password going back to default, WiFi customized setting also be removed along with other changes. It’s the same as the new router from the factory. At this point, if the router is having a problem and the reboot will have no change then factory resetting is the best possible solution. As it removes all the data this is not your first choice, but at a particular point rebooting is the first thing to do. Updating the router firmware can also sometimes fix issues.
The default router reset is used when you are trying to sell the router and the other person will get the reset router and he can’t be able to see your login details. Most of time people don’t know how to do the factory reset. The steps for the resetting are described below:
The router and updates in the Wifi device can bring back the customs setting. You can also restore factory settings by logging into the router. The reason for the router factory reset is described below:
Can The Wifi Owner See What I Search?
Can The Wifi Owner See What I Search? Answer: The Wifi provider can also see the search history and the website we visit with the use of their internet. Most of the routers have the in-built features for tracking from the organizations like Netgear. when the router is implemented, it tracks the searRead more
Can The Wifi Owner See What I Search?
Answer: The Wifi provider can also see the search history and the website we visit with the use of their internet. Most of the routers have the in-built features for tracking from the organizations like Netgear. when the router is implemented, it tracks the searching history and login to it so the Wifi provider can see the websites we visit with the internet connection. However, if the user is a technical expert, then they can hide the history with the use of the software.
Most people are curious that either their history can be seen by someone else or not? Is it visible to their Wifi owner which site he can visit? Different kinds of questions arise regarding it and we will discuss them in the following article.
The Wi-Fi provider is well aware of the sites we visit on the internet. But it depends on a few things that ensure that the Wifi owner can heck the sites. The factors are listed below:
The Wifi owner might use different types of sniffing software such as Wireshark that’s why the use of a VPN is essential when you use the internet.
The Wifi router can also track the browsing history, the previous version of the Wifi router has no features to track the activity. For it, the user must have the advanced tools and costly software to check someone else history through the use of the router. The advanced routers have in-build features for tracking which track the search history, and the user privacy is demolished.
Moreover, not just the browsing activity is tracked but there are many things that can be checked. the list of the things is described below:
What Does All Circuits Are Busy Mean?
What Do All Circuits Are Busy Mean? Answer: The circuits are busy defining that the outgoing calls of the phones are not available.it may happen due to many reasons such as wrong number, weak network, network overloading, or power failure. The problem can be solved through the restart of the phone,Read more
What Do All Circuits Are Busy Mean?
Answer: The circuits are busy defining that the outgoing calls of the phones are not available.it may happen due to many reasons such as wrong number, weak network, network overloading, or power failure. The problem can be solved through the restart of the phone, location change, remove the SIM for some time to make it work.
There might be various reasons why the notification of all circuits is busy show. Some of them are discussed below with their solution:
No free outgoing calls:
The reason for the message all circuits are busy is due to the free calls at the moment. This happens due to low signals area where the towers are in less number. The phone companies always give free calls to complete the connection. This will also happen when all the users place the call at the same time. It can be solved by waiting for a moment and trying after some time passes because the line might be free.
Wrong number:
The message will display when you dial the wrong number by missing the one digit and making a call. Sometimes when you make a call on change network the message is provided. The wrong number is the problem from your side, but with a different network, it is the service provider’s problem. It is solved as soon as you saw that it’s a wrong number just hung up. if the issue is from the receiver side, then you can’t do much.
Weak network coverage:
The weak network is also the reason for the error message. If the station is not gaining the signals from your phone, then the connection with the outgoing calls is not possible. The weak network is due to the distance from the network towers. The inappropriate network equipment is also a problem. It can be solved by checking the signal display on the screen which shows whether the signal is weak or not. If the signals are weak then go to the place near the towers.
System overload:
It can happen when multiple users using the service at the same time. Regardless they are making calls, text messages or internet excess traffic make the system overload. System overload happen in peak time or on holidays. You can solve this by waiting till the traffic reduce and then make a call, or make the call other then the peak time.
See lessWhat Is Cloud Computing With Example?
What Is Cloud Computing with Example? Answer: Cloud computing work is to deliver the services such as servers, databases, and software’s provide storage on the internet with fast speed, flexibility, and creativity. Cloud computing is cost-effective because you just need to pay for cloud services noRead more
What Is Cloud Computing with Example?
Answer: Cloud computing work is to deliver the services such as servers, databases, and software’s provide storage on the internet with fast speed, flexibility, and creativity. Cloud computing is cost-effective because you just need to pay for cloud services no need for the operating system, and the infrastructure works efficiently and on a larger scale. For example, the Wats app is the cloud computing-based infrastructure when communication occurs through it. The data and messages are stored in the hardware provided through its services.
Cloud computing operates on the three principles that define its entire infrastructure and which are listed below:
Cloud deployment models:
The deployment models of the clouds consist of four types which are used according to the requirements of the companies. the types are described below:
Private clouds:
The resources are reserved for the specific company. For the intra-business interaction, the model is best suited. In it, the resources are maintained and worked by the particular company.
Community clouds:
communities and organizations are the ones that use this model for the resources.
Public clouds:
B2C interaction generally used this model. The resources are handled, owned, and work for the government, for academic purposes,s or for business companies.
Hybrid clouds:
The model work for both B2C and B2B interactions, that’s the reason it Is called the hybrid cloud. The resources are connected with different clouds.
Cloud computing benefits:
Cloud computing brings the advancement in the technology and some of its benefits are described in the following:
Cost:
Cloud computing reduces the price of both hardware and software, the cost of the data center set up, the cost of the electricity, IT expert’s cost for maintenance, etc.
Speed:
Cloud computing work on self-services that’s why most of the resources are given in no time with a few clicks.
Performance:
One of the big services runs on the worldwide data center which updates on a regular basis to enhance the efficiency of the hardwares. It provides the advantages such as the lessen the network latency etc.
Security:
Cloud computing has strict policies that handle security and keep it tight that protect the data, and applications from the Virus, hijacking, malware, etc.
See lessWhat Is Whaling In Cyber Security?
What Is Whaling in Cyber Security? Answer: Whaling is the type of phishing attack that targets the executives’ officers, for masquerading as a legitimate email. It is a digital fraud that occurs through social engineering and by manipulating the victims by initiating fund transfers. Whaling enforcesRead more
What Is Whaling in Cyber Security?
Answer: Whaling is the type of phishing attack that targets the executives’ officers, for masquerading as a legitimate email. It is a digital fraud that occurs through social engineering and by manipulating the victims by initiating fund transfers.
Whaling enforces the manager or the chief to steal personal information from the company. It is also referring as the whaling phishing attack. The whaling derived from the attack size and the whales in the company is selected by the given authorities to the employees.
As their targets are big that’s why it is difficult to detect them. In organizations, security officers reduce their attacks with the help of the information security training program among employees. Whaling attacks encourage targets to provide sensitive or commercial information with the emails, content spoofing, such as the hackers sending an email that appear from a trusted company or individual and they also use the website that is developed to contain the malware and use it as a source to attack.
The emails or the websites for the whaling attacks are specially built and also have target names, task statuses, and other types of information needed for the attack. Because the attackers are already prepared the detection is very difficult for the whaling attack.
Whaling attacks often occur through social engineering methods such as links on websites or attachments that contain the virus infecting the target system or getting the authorized data. High-ranking officers like CEOs are the main target because they can be used in fraudulent funds transfers with the help of BEC (Business email compromise). Sometimes the CEO of the company can be manipulated and ask the employees to move with the transactions.
These are the cyber crimes that can easily fool the targets because the hacker did a lot of effort to develop them to achieve a lot in return. The social media platforms like Facebook, Instagram, Twitter are mostly used by hackers to get information on their target to make the attack successful.
See less