Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
What Kind Of Data Can Be Lost When A Computer Is Turned Off?
What Kind of Data Can Be Lost When A Computer Is Turned Off? The Data which is lost or have the chance to be lost when the computer is turned off is RAM (random access memory) and the reason is RAM is a volatile memory it is not fixed but a changeable memory while the ROM (read-only memory) is non-vRead more
What Kind of Data Can Be Lost When A Computer Is Turned Off?
The Data which is lost or have the chance to be lost when the computer is turned off is RAM (random access memory) and the reason is RAM is a volatile memory it is not fixed but a changeable memory while the ROM (read-only memory) is non-volatile it is fixed and only change when the developer wants to change.
A data is a computer is stored in different manners and the memory is the primary place and the data is stored in a manner that it is accessible by the CPU of the computer. RAM is the fast storage place where data can be achieved very easily with not much delay. The RAM is a direct connection with the CPU through the memory bus and the data can be accessed by it quickly. The data for the active program and the OS all are stored in the RAM. That’s why because of the flexibility the RAM losses the data when the power is turned off. The data stored in ROM is related to the instruction to start the program and for the computer initiation .in the case of the full storage of the ROM than the virtual memory is used because it is slower than the RAM.
Let’s discuss the types of memory who has the chance to lose when the computer is turned off in the following:
Main RAM:
The Main RAM has different characters than the volatile RAM. the browser, word processor, and different programs all use it as the scratchpad in a manner to add remove or update the data in it. Millions of the small transistors enveloped in the integrated chips are present in the main RAM. It works at a high speed, and the chance of it being lost at the time of the power loss is high.
Cache RAM:
In the main memory, the microprocessor has the extra memory units which are called a cache and they are at the three stages of the cache L1, L2, and L3 and the speed of the working is up to 1 billion of a second or as we say 60 to 80 times more than the regular RAM.it is quite expensive than the regular RAM and the microprocessor has the million or fewer characters of this memory. But like the standard RAM, it has the chance to be lost when the computer is turned off.
See lessWhen Using Snmpv1 Or Snmpv2, What Piece Of Information Is Needed To View Information From An Agent?
When using SNMPv1 or SNMPv2, what piece of information is needed to view information from an agent? Entity. Community string MIB. OID. Answer: The community string is the piece of information that is needed to view the information from an agent when someone is using the SNMPv1 and SNMPv2. What isRead more
When using SNMPv1 or SNMPv2, what piece of information is needed to view information from an agent?
Answer: The community string is the piece of information that is needed to view the information from an agent when someone is using the SNMPv1 and SNMPv2.
What is SNMP?
SNMP is the simple network management protocol it is based on the response/request format and a standard protocol.it works in a way when the network manager sends the request the response comes from the managed agents in return. The SNMP has the three-basic versions SNMPv1, SNMPv2c, and SNMPv3.
The base of the protocol is a simple set of operations that gives the authority to modify the state or the condition of SNMP-based devices. Some of the examples are that the SNMP can use to power off the interface of the router and also check the speed of the operating Ethernet. SNMP tells when the switch is heated up and needs to be dislocated from the power.
Most of the time SNMP is connected with the router management but it can also manage many other devices such as Unix, Windows, printers, modems rags, etc. Before the SNMP the protocol for the router management is the SGMP (simple gateway management protocol). the running devices which allow the retrieval of the SNMP are also managed such as the web servers and database along with the physical devices.
Now that you know the SNMP let’s take a look at the overview of the different versions of the SNMP in the given section:
SNMPv1
SNMPv1 is the very first version of the SNMP the setup of it is easy and require few plain text community.it is open source and the standard protocol but in some areas, it lacks to maintaining the applications. Such as it has 32-bits counters and the security is not so good only the community string is the best method of security in the SNMPv1.the upcoming version has covered these issues only the smaller RTUs support the SNMPv1.
SNMPv2c
It is designed in 1993 and is the sub-category of the SNMPv2.the operations like the Get, GetNext, and the set are the same in both SNMPv1 and SNMPv2c .but the feature which is lacking in the previous version is the Inform command .despite the traps which can only be received by the manager the informs have the acknowledgment of the message response. If the manager fails to respond the inform the SMNP agent to resend them. Various other features are improved error handling and SET commands.
SNMPv3
It is the very close version of the SNMP and the feature which makes it unique is its enhanced security. For the management of the security the model which is designed is a User-based Model and for the access control is a view-based access control model.
SNMPv3 has other 2 forms: authentication and encrypting.
Authentication:
The authentication ensures the traps can be read by the intended recipient. when the response is created a special key is given on the base of EngineID of entity, which is shared among the recipient and also receives the response(message).
Encrypting:
The message of SNMP is encrypted by privacy to make sure that unauthorized users can not be able to access it. Privacy is useful when the SNMP response is transferred over the internet.
See lessWhat Statement Regarding Crossover Cables Is Accurate?
What statement regarding crossover cables is accurate? It establishes the computer connection with HUB or switch. T568B wiring is used on the ends. Two Gigabit ethernet cables are connected with the help of it. It is for the connection of the two Pcs Together. Answer: The statement related to the crRead more
What statement regarding crossover cables is accurate?
Answer: The statement related to the crossover cables which is accurate is option 4 that which is used for the connection of the two PCs together.
What is the crossover cable?
A crossover cable is the one form of cable which is used for the connection of the two same devices.it works by the process of reversing the transmission and receiving the pins at ends so that one device input is the output of the other device and via.
Mostly the cable on which the crossover is implemented is the twisted pair cable because it has four pairs of cables. And for the proper working of the crossover, both ends should have the same format for wiring.
The swap in the wires or reverse might be changed because it depends on the network and the devices in use. The mesh network can be created with the help of crossover cables because these can work without the intermediary devices i.e., switch or hub. For example, in the 100baseTX network to create the crossover the second and third pair have to swap with ends. Some of the examples of crossover cables are rollover cables, loopbacks, and null modem cables.
Uses of the crossover cables
We have listed some uses of the crossover cables in the following section:
Difference of the straight-through ad crossover cables
The key pit or the difference of straight through ad crossover cables are given in the following:
What Vendor Neutral Protocol Implements Support For Vlan Tagging?
What vendor-neutral protocol implements support for VLAN tagging? ISL VTP 802.1Q VSTP Answer: 802.1Q is the vendor-neutral protocol that implements support for VLAN tagging. Now that we got our answer let's understand the concept of VLAN tagging, we have listed some of the characteristics of VLAN taRead more
What vendor-neutral protocol implements support for VLAN tagging?
Answer: 802.1Q is the vendor-neutral protocol that implements support for VLAN tagging.
Now that we got our answer let’s understand the concept of VLAN tagging, we have listed some of the characteristics of VLAN tagging in the topic.
What is VLAN tagging?
VLAN tagging gives access to the different IP addresses to be configured as the multiple VLANs. when the packets are moving that are tagged with the specific ID which is the VLAN ID tag associated with IEEE 802.1Q VLAN specifications. The tags on the packets are extracted by the Ethernet switch or router and transferred the packets to the destinated VLAN group.
The tagging gives the user a choice that the leaving packets have the VLAN ID tag inserted in the header or not. With the help of the graphical user interface of the web, the application user can identify the 16-bit tag control information which is allocated to the service IP address or a media 0 IP address, or a Media 1 IP address.
The VLAN helped in a way that various VLANs are handled to the port. VLAN tagging determines which VLAN belongs to the other on the intended side. For easy identification, the packets are marked with Ethernet frames. The full-fledged logical system was built along with the help of VLAN tagging in a physical network. The domain can also be built with VLAN tagging.
How does the VLAN tagging work?
The tagging works with inserting the VLAN ID to the header for the recognition of the present network.in this way, we can identify the interface or the broadcast place where the packets Are destined to receive the right knowledge. The configuration of the switches is done before the VLAN tagging process starts. The multiple broadcasts are separated to the individual domain with the system. clients and the knowledge are configured, arranged, and logically grouped. the bridging can be moved with the VLAN tagging. The system is thoroughly optimized. The working of the VLAN is in the following:
First, the frame has the 4-byte VLAN tag and it has VLAN ID, the tag comes after the Source MAC and the FCS is removed in this stage. at last, the FCS is calculated again base on the entire frame. If the VLAN ID is 12-bit then the expected VLANs are 4096.
See lessWhy Are Open Standards Important In The Data Communications Industry?
Why are open standards important in the data communications industry? The open standard is important for the data communication industry because they allow the interaction between the software and the hardware from a different businessperson. With the increment of the data factories, the availabilitRead more
Why are open standards important in the data communications industry?
The open standard is important for the data communication industry because they allow the interaction between the software and the hardware from a different businessperson. With the increment of the data factories, the availability of the data is very complex .and if we want our industry to grow drastically then the open standard is the important factor in this because people will attract to the platforms that have the open standard.
Data communication
Data communication can transfer the message in encrypted form from one end which is the source to the other end which is the destination with the help of the electronic media. Simply it is the message transfer way from one end to the other with the media either wired or wireless. Communication happens when the digital media is converted to analog and the analog to the digital and the information is carried in the form of signals. The signals are voltage proportional to the amplitude of the voice.
Communication occurs with the exchange of information along with the help of the standard and the protocols. The communication is completed when it follows the few points which are described in the following:
Characteristics of the data communication
The characteristics of the data communication are described in the following:
Delivery:
The data need to be delivered to the correct destination .it is important that the destined device can receive the data because this will affect the function of the system.
Accurate:
The data must transfer in its actual form because if the data during the transmission is altered then it is for no use and incorrect.
Timeliness:
The data must reach the destination at the exact time. The late data re of no use. For the video, audio, and image they must transfer to the destination as they are developed without any delay. The delivery on time is the real-time transmission.
Types of data communication:
The types of data communication are:
Personal computer to personal:
The personal computer is connected on a one-to-one basis. There is no restriction on information and the information is an online communication and offline communication.
Personal to host computer:
The personal computer depends on the host computer for the data transmission (send, receive. And information storage). The server is mid-range and it can give the facility of processing and the data to a personal computer.
Processor to processor:
The information is an exchange between more than two computers because the data is huge such and the updating of the files.
See lessWhat Is The Purpose Of The Network Security Authentication Function?
What is the purpose of the network security authentication function? To get the identification of the user. To find the resource of access. To keep an eye on user actions. To give challenge and response. Answer: some terms like authentication, authorization, and accounting are the services in the neRead more
What is the purpose of the network security authentication function?
Answer: some terms like authentication, authorization, and accounting are the services in the network known as the AAA. authentication needs to find the user identification while authorization determines the resource of the access and accounting keep an eye on user actions.
What is authentication?
The authentication is to determine who are the user, the identity of the user. The term user authentication is also common which means checking the user identity when the user login to the particular app, system website, etc.
The main purpose is to prevent unknown or unauthorized users to get access to the system. the OS (operating system) has 3 ways to determine the user identity which are: Password, physical identification, and biometric. These are explained in the following section:
Password:
A password is an ancient and common method to check user identification. A password is the digits is a text which is specifically allocated to the user who has the access to the system. The user has their password and the username which is only known by him.
When the user logs in with the user name and password the system checks its data either the given login detail is correct or not and gives the response according to it. if the detailed match with the system the user is allowed and vice versa.
Physical identification:
In this method, a machine determines the user identification with some specific symbols, cards, or badges. The companies have the physical identification method by allocating the employees an identity card that has the information stored. when the employee shows the card, he/she will be allowed to enter the companies otherwise the alarm went off.
Sometimes along with the card, the password is also needed to enter such as the ATM. Nowadays the smart card has been invented which contain all the information along with password but it has a drawback when it gets lost.
Biometric:
The biometric is further advanced than physical identification.it involves biological characteristics such as voice, fingerprints, face, eyes, etc., the devices are a scanner that collects the unique data of the user. Software that transforms the data to form which is stored. A database that has the information of different users.
The function of the authentication:
The function of the authentication is given in the following section:
Message authentication:
The function has two levels which are:
Lower level: generate a value to authenticate the message.
higher value: give the signals that the message has been received.
The function has three groups:
Message encryption: encrypt the message to the cipher form.
Message authentication code: the secret key with a fixed length that acts as an authenticator.
Hash function: it maps the message regard of the length to hash value for authentication.
See lessWhat Technique Is Used With Utp Cable To Help Protect Against Signal Interference From Crosstalk?
What technique is used with UTP cable to help protect against signal interference from crosstalk? Twist the wires into pairs. Wrapping the foil shield around the wire pairs. Encase the cable in a flexible plastic sheath. Terminate the cable with the grounded connector. Explanation: To help protectRead more
What technique is used with UTP cable to help protect against signal interference from crosstalk?
Explanation:
To help protect against signal interference from crosstalk the technique used by the UTP cable is to twist the wires into pairs because it will create the magnetic field of each wire which cancels the effect of each other.
What is UTP?
UTP (unshielded twisted pair cable) is an omnipresent copper cable type that is common in telephones wiring or the local area networks. Unshielded cable has a total of five types which are identified with the prefix CAT and each has different bandwidth. The connector for the UTP cables is RJ-45.
Other cables like the coaxial cable and the fiber optic cable have their benefits and cons but UTP is the most useable cable because of its cost and the setup of installation is easy compared to others.
Working of the UTP cable:
The UTP cable consists of four twisted pair of copper wires, which are surrounded in the plastic cover along with various pair which depends on the bandwidth. The wire is twisted to each other and then, they are further twisted together to prevent the crosstalk and the EMF of wires individually because they can reduce the performance of the network. The signal in UTP requires both wires.
The cables have their color code so it is easy to identify the pair. The basic colors are blue, orange, brown, and gray. And they are twisted with other colors such as white, red, black, yellow, or violet. one wire in a pair consists of a solid color and the other is with the suitable one. Such as the blue solid wire is paired with white-blue striped wire for easy identification. The pair cable is designed by alexander graham bell in 1881. different user needs different pairs such as analog, digital, or Ethernet.
UTP cable types
There are a total of five UTP cables which are discussed in the following:
CAT 3: the cable is not as common in today’s world it is implemented in phones the support is 10Mbps up to 100 meters.
CAT 4: it is common in the token ring and the CAT4 is 16Mbps within the range of 100 meters.
CAT5: it is common in Ethernet-based LANs consist of the two pairs which are twisted together the support is 100 Mbps in the range of 100 meters.
CAT5e: it is also present in Ethernet LAN but has four pairs of the cable. the support is 1G bps up to 100 meters
CAT 6: it is common in the Ethernet LAN and the central network for Data it has four twisted-pair cables the support for 100 meters is 1 Gbps while for 50 meters it is 10 Gbps.
See lessWhat Will Happen If The Default Gateway Address Is Incorrectly Configured On A Host?
What will happen if the default gateway address is incorrectly configured on a host? In LAN the host can’t communicate with each other. The packets which are coming from the host cannot be forwarded by the switch. For the accurate default gateway, the host needs to use the ARP. To another network, tRead more
What will happen if the default gateway address is incorrectly configured on a host?
Answer: when the message is sent to the other network from the host it can be directly sent with the help of the message but to send the message to the remote network, we need the router for the successful conversation which is also called a default gateway. Because the frames of the remote network can not be used with a direct message and the IP frames are sent to the router in the remote network then the router will further be sent toward the destination port. That’s why if the default gateway address is incorrectly configured on the host it can’t be able to communicate with another host on the remote network but communicate on the same.
Now that you get your answer let’s further study the default gateway, its function, and how to find it on the PC. Read the topic to the end so that your curiosity ends!
What is the default gateway?
A default gateway in the computer network is the node that acts as the forwarding node when the IP frames cannot be able to find their destination port to another network. in simple when the host wants to communicate outside its network then the default gateway is used. the router and multilayer switch is commonly used as the default gateway.
Functions of the default gateway:
The functions are discussed in the following section:
How to find the PC’S default gateway?
You can find the default address of the PC with the help of the few steps in the following:
If the configuration of the default gateway is not happening then the frames will be dropped because they can’t be able to leave the host without configuration.
If the configuration is incorrectly configured then a few problems might be arising:
What Is The Prefix For The Host Address 2001:Db8:Bc15:A:12ab::1/64?
What is the prefix for the host address 2001: DB8:BC15: A:12 ab::1/64? 2001: DB8:BC16. 2001: DB8:BC15: A 2001: DB8:BC15: A:2. 2001: DB8:BC15: A:21 Answer: the network side of the host address is determined with the prefix length. A/64 indicates the prefix length of the 64 bits of the IPV6 address. tRead more
What is the prefix for the host address 2001: DB8:BC15: A:12 ab::1/64?
Answer: the network side of the host address is determined with the prefix length. A/64 indicates the prefix length of the 64 bits of the IPV6 address. that’s why the prefix is 2001: DB8: BC15: A.
Let’s take a look at the method to determine the prefix of the IPV6 address in the following section. That’s why to read or learn it to the very end!
What is a network prefix?
A prefix is the aggregation of the IP address and the IP has two versions IPV4 and IPV6. the V4 has 32 bits while the V6 has 128 bits in a number. With the use of technology, the IPV4 is not enough that’s why the IPV6 is developed. The prefix length finds the accumulation of the number of bits is the accumulation is also determined by it. The prefix finds the number of IP addresses in the specific host part of the address.
Let’s see at the simplified example for the prefix consider the internet as the city and the prefix as the city block while the IP address is the building block of the city. If the city block is present then the building block is also with the IP address and with each IP address of the building the block is itself the prefix.
The prefix of the IPV6 address
IPV4 gas its subnet mask and regard of 255.255.255.0 we can use the prefix length. such as the IPV6 prefix length is:
2001:1111:2222:3333: :/64
Behind the / the numbers used to indicate the prefix number, we can use. And the above example (2001:1111:2222:3333: :/64) shows the prefix of 64 bits and another number behind it is used for the host.
Unlike the IPV4 in the IPV6, we can find the prefix and it works differently rather than find the subnet mask. Let’s see an example:
2001:1234:5678: 1234:5678: ABCD: EF12:1234/64 which is the prefix? And which are the Ip address and the host?
As we know that /64 bits mean the first 64 bits are the prefix. the hexadecimal has 4 bits which mean 2001:1234:5678:1234 is the prefix part of the address. Since the prefix part has 16 hexadecimal characters which means 16 *4 = 64 bits and the rest of the address is the IP address that determines the host.
5678: ABCD: EF12:1234
Now that the Prefix part is determined but the written form of it is not correct. for prefix, an extra zero are present at the end of the prefix, such as
2001:1234:5678: 1234:0000:0000: 0000:0000/64 is the exact prefix length we can also shorten it to the 2001:1234:5678:1234: :/64.
See lessWhat Three Application Layer Protocols Are Part Of The Tcp/Ip Protocol Suite? (Choose Three.)
What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.) DNS ARP. NAT DHCP. FTP PPP. Answer: There are many applications layers protocol but in the given options DHCP, FTP and DNS are the protocols that are part of the TCP/IP protocol suite. In this topic, we havRead more
What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.)
Answer: There are many applications layers protocol but in the given options DHCP, FTP and DNS are the protocols that are part of the TCP/IP protocol suite.
In this topic, we have explained the protocols which are present at the application layer in the OSI model. those who want to know will stick to the topic to the end to get the details.
Application layer protocol
The protocols which work under the application layer are categorized into two forms such as:
Some of them are discussed in the following section:
Domain Name System
It is the model for the client-server and is also known as the DNS. For the transport layer, it acts as the user datagram protocol which helps in communication. A hierarchical naming scheme is used by it.it is configured with FQDN and with other protocols of the internet. An FQDN requests the DNS and the response is given with the IP address mapped. the port for the DNS is 53.
SMTP (Simple Mail Transfer Protocol)
The electronic mail among users is transferred with the help of these protocols, and the client-server software is used in this transfer. The user types the message in the email then it contains it until the internet is not connected. When we submit the email then it is handled by the message transfer agent which is also present in the client-server software. The protocol is also used to transfer the email to another transfer agent. As the SMTP is used to only send the message the server uses it to both send and receive the email. The port for the SMTP is 25 and 587.
File transfer protocols
It is the most common protocol which is used to send the file over the internet. The TCP/IP is used by the FTP and the port for it is 21. It also works on the client-server model the client request for the file while the response is given by the servers to the client. Port 20 of TCP is used by FTP for the exchange of information.
When the client requests a file, the server gains the request and opens the TCP connection, and transfers the file toward the client back. When the transfer completes the connection terminates and opens with another request.
DHCP protocol
Dynamic host configuration protocol is the protocol for the management of the network in the application layer of the OSI model.it helps to give the IP address to the devices so that they can communicate with the help of the given IP addresses. The main goal is to give the specific and unique IP address to the nodes or hosts. The protocol gives the subnet mask, router address, and the DNS server as well. The protocol has numerous IP addresses that’s why each device has its address which is different from another device.
See less