Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
What Are Three Characteristics Of Multicast Transmission? (Choose Three.)
What are the characteristics of multicast transmission? Multicast transmission is a way to transfer the real-time applications’ spreads to the numerous of the subscriber and high-bandwidth.it is efficient and effective than unicast transmission, which transfers data to the individual recipient.in siRead more
What are the characteristics of multicast transmission?
Multicast transmission is a way to transfer the real-time applications’ spreads to the numerous of the subscriber and high-bandwidth.it is efficient and effective than unicast transmission, which transfers data to the individual recipient.in simple terms, the multicast from the source sends one data stream and they are allowed to replicate to stream to the different subscriber.
For example, the cable network on the TV they are providing the signal to various users because they are using the method of multicast transmission the main sender is one but it is distributed to many receivers. The multicast in the networking is to send the same packet to a group of different clients.
The IP multicast is the same as the unicast but the main difference between them is the Class of destination which is the Class D IPv4 address in the multicast. The protocol for the multicast is UDP. Multicast is of use till the clients need the same type of data at the time and during this, the bandwidth provided by the multicast is high.
LANs such as the Ethernet mostly assist multicast transmission, the shared LAN causes the packets to arrive at the NIC which is connected to the LAN. Nowadays the LAN does not have the NIC card instead the multicast implements the adapter to receive the packets and remove the unnecessary ones.
Application of the multicast transmission
The multicast transmission used in the various platforms and some of them are discussed here:
Use on IP network: The multicast is useful in the real-time application i.e., news events and the distribution of the scores in the sports. The application can be auditory and visuals or in the form of text messages. with the help of the IP multicast, it is low in cost and the CNN is the big IP multicast.
Corporations: The corporation uses multicast for employees’ training and keeps them up to date with the news and the events that occur in the company. All the annual year meetings with the shareholder broadcast with the help of it.
Politics: The political parties use multicast to inform them about the development of the projects and call them in case of an emergency.
What are the three characteristics of multicast transmission? (Choose three.)
Answer: the broadcast message has the single frames which are sent to hosts in the network, these are for the IPv4 request and map the upper layer to the lower layer address. The multicast is single frames sent to a bunch of hosts and the protocol for the exchange routers are OSPF and RIPv2.the address 224.0.0.0 to 224.0.0.255 is for the local link address for the bunch of local network access.
See lessWhat Does The Ip Address 172.17.4.250/24 Represent?
What does the IP address 172.17.4.250/24 represent? The IP address 172.17.4.250/24 determines the host address. IP address forms from the network address and the host address. The /24 indicates that the Network address is 172.17.4.0 and the broadcast address for the IP is 172.17.4.1 to 172.17.4.254.Read more
What does the IP address 172.17.4.250/24 represent?
The IP address 172.17.4.250/24 determines the host address. IP address forms from the network address and the host address. The /24 indicates that the Network address is 172.17.4.0 and the broadcast address for the IP is 172.17.4.1 to 172.17.4.254.
The host address is for the computers to communicate with each other and the switch uses it to transfer the packet to the correct host. While the network address was allocated to the network for the router to send the packet after then the switch took over and transfer the packets to the destination with the help of the host address. Because of the network and the host address, the routing becomes faster, and the transmission increases.
Host address
The physical address is the host address of the computer. Simply, the ip address is the host address. it is a 32-it address that specifies the host in TCP/IP network. The IP address is in the decimal forms separated by the dots, Such as 192.168.123.132.
Example:
The IP address 192.168.123.132 will convert to the binary form which is 11000011101011000000111100001010 it is very difficult to identify them so they are divided into 8 digits and the section of the digits are called asoctect.11000011.11011011.00001111.00001010 this is also easy as compared to the other one but to understand the sequence is difficult that’s why the decimal form of the IP address is the most suitable and easy to remember.
In the TCP/IP wide area network, efficient work is possible with both host and network addresses. The router which is responsible for packets transferal on a network doesn’t know the location of the host or destination where the packet needs to be reached. the router has the information of the network while the host has the information stored in the routing table to transfer the packet to its destination in the network. The packet is first transferred to the network after then to the destination host.
For the best process let’s have a look at 192.168.123.132 have two parts 192.168.123 Network .132 host or 192.198.123.0 -the network address and 0.0.0.132 as the host address.
Working of the host address
The ip is allocated on the interface which is responsible for the computer connection in a network. And the interfaces are given with unique IP addresses. And the interface with the same IP does not work. Let’s understand the Host address with an example, suppose we have four computers C1MC2, C3, C4 which are connected and they have the same IP address which is 4.4.4.4/8. the C1 sent the data to C4 since the IP address is the same the C1 sets the destination address 4.4.4.4/8.
When the packets reach C2, C3, and C4, the destination IP address is checked and they all have the same configured IP address that’s they all assume that the packet is for them and starts the processing. When the other packet find that the packet is not for them, they discard the packets after then it will reach the C4 computer and the processing of the C2 and C3 is unnecessary.
See lessWhat Part Of The Url
What Part of The URL Http://Www.Cisco.Com/Index.Html, Represents the Top-Level DNS Domain? www .com Https. . Html Answer: the part of the URL Http://www.Cisco.com.html that represents the Top-level domain is the. Com and it is due to there are the components in the URL with a specific function and tRead more
What Part of The URL http://Www.Cisco.Com/Index.Html, Represents the Top-Level DNS Domain?
Answer: the part of the URL Http://www.Cisco.com.html that represents the Top-level domain is the. Com and it is due to there are the components in the URL with a specific function and they are described in the following:
A few more information about the URL and its components are discussed in this topic. So stay connected to the end of the article.
What is a URL and its Components?
URL stand for the uniform resource locator .it is the identifier for the resource located on the internet.it is developed by Berners-Lee in 1994. A string that determined the data from the internet. Here is an example of how the data is accessed from the internet for a specific site.
http://www.dash.com
Syntax of the URL: Protocol://hostname/filename
Component of the URL
A simple website has a maximum 3 parts but in a few websites the URL has more than three parts which are described in the following:
Scheme:
The scheme in the URLS is HTTPS:// which is also known as the protocol which determines the rules for the transmission of the data. The HTTP allows displaying the page in the Html format and the encryption information on the page.
Subdomain:
The subdomain is HTTPS:// www. Which is for the separation of the website which defines the resource type sent to the clients. The subdomain www is the general for all the resources on the web. The blog subdomain determines the audio type.
Domain name:
The domain name https://www.example. Determine the organization which has a URL for their website. Such as www.facebook.com determine that the website owner is Facebook.
Top-level domain:
The top-level domain is the https://www.example.com defines the organization type whose are registered such as the .com determine the commercial identity.
Port number:
The port number https://www.example.com:80 in the URL determines the type of the service which is according to the client’s request. But the server has various services but there is the default port number as well i.e., 80 for the HTTP and 443 for the servers of the HTTPS.
Path:
The path syntax in the URL is https://www.example.com:80/blog/articel.search it defines the correct location of the files the clients want. The path in the example for the specific article on the blog page.
Query string operator:
https://www.example.co.uk:443/blog/article/search?
The query string operator which has the parameter for the search is denoted with? it indicates the specific query or the information is needed.
Fragments:
https://www.example.co.uk:443/blog/article/search?docid=720&hl=en#dayone
the fragments present at the end of the URL and present at the end which start with #.it denotes the exact location such as the ‘id’ in the HTML document.
Query string:
https://www.example.co.uk:443/blog/article/search?docid=720&hl=en
the parameter of the data in the website is defined with the help of the query string and they are denoted with the equal (=) sign in the address. While in the multiple parameters the sign is &.
See lessAn Inkjet Printer Output Is Streaked. What Would You Do?
An inkjet printer output is streaked. What would you do? Sometimes the problem with the inject printer happened and the output has the ink spots in a random pattern on the page or streaked, then you don’t have to worry about it. There is a different solution to this problem. This post has the methodRead more
An inkjet printer output is streaked. What would you do?
Sometimes the problem with the inject printer happened and the output has the ink spots in a random pattern on the page or streaked, then you don’t have to worry about it. There is a different solution to this problem. This post has the methods to resolve the problem of the inject printer output streaked.
The problem is due to the dirty and clogged print head. To solve this just switch off the printer and remove the plug, keep it for 15 minutes. And then plug the wire into the switch while you are going to turn on the printer. If the streak may occur again then check the ink inside the printer cartridge, and change it to the new one and check whether it solves the issue. The third solution is you need to clean the print heads to make the output clear. If still, the problem remains same after these efforts contact with the customer service or to the electric store.
What is the inject printer and its cause for streaks?
The inject printer works in a way that it put the ink drops from the print cartridge directly on the printed page. The printer uses the toner cartridges which are full of dry prodder which are printed on paper with the help of the laser and heat. But sometimes the inks clogged on the pages that ‘why the automated printer regularly clean the printer to make it good for work. The reason for the streaks may vary and some of them are discussed in the following:
Cartridge problem
Sometimes the problem (streaks) occurs due to the Cartridge in the inject printer. This may be due to the clogged cartridge nozzle which case the uneven distribution of the ink on the pages. If the printer using the cartridge then maybe, they have the printer “heads” in them, all you need to clean them if they are dirty. If the printer uses the ink cartridges it might be damaged in some way.
Printer problem:
Sometimes the ink might be leak into the printer parts such as the rollers, which need to be cleaned. Mostly this happens when the print streaks are on the outer side or the edges of the pages. The other situation is that the printer head might not be in the exact location and it needs to be straightened. The roller parts of the computer become damaged or in need of a clean or repair.
Tips to repair or clean
During the roller cleaning, use lint-free clothe.do not touch the roller because the oil might be stick on your hands a cause further problems. For the cleaning use lint-free, coffee filters, cotton balls in a pinch for better results. To remove the extra cartridge ink, dip the heads with distilled water or with the alcohol rub it, and with the paper towel dry the area. If the printer has the auto self-cleaning try to run it and then print again.
See lessWhen Removing Screws While Working On A Laptop, What Should Be Done With The Screws?
When removing screws while working on a laptop, what should be done with the screws? It should be inclined. It should be put inside the laptop case. Store or label it somewhere. Paint them for some indication. Answer: The correct answer is C is it should be stored or labeled for further use in caseRead more
When removing screws while working on a laptop, what should be done with the screws?
Answer: The correct answer is C is it should be stored or labeled for further use in case of need.
Now you have the answer but let’s discuss how to remove the stripped screw from the laptop different methods used in the process.
Stripped screws removal with different methods
The screws in the laptop are mostly good with the small heads which need the specific size of the screwdriver, and if the screw overtightened due to some reason it becomes stripped and, in that case, you need to control and turn the screw.it is serious because sometimes the screw stuck so we have come with different methods to remove the stripped screw in the following:
Change the screwdriver size
Do not try to remove the screw when it strips, because the laptop screw is kind of soft related to the others and the situation becomes serious. Try to change the size of the screwdriver use the larger one because there might be a chance it can control the screw and remove it.
If the larger size screwdriver fails switch Phillip’s head with flathead style. During the screw stripped the indentation might not fit so changing with the simple one can help get the grip on the head. Switch with the different sizes until the grip is attained. If the screw is stripped tightly then use other instruments other than the screwdriver.
Use pliers
Sometimes the laptop screw concaved and very complex to get a grip with pliers. Try to find the fine needle nose plier to get a strong grip on the screw with pliers. Mostly the small portion of the screw is visible try to get grip on it and then the whole screw moves because the grip on the visible side is most efficient at that time. Also, when you find the grip is tighter than it might break the screw then slightly lose it. With the fine grip move the crew until it is removed.
Use a rubber band
The rubber might fill the gaps in the stripped and give the grip to the screwdriver. Use a rubber band of a specific size and wrap it on the screw head. Press the screwdriver and with the help of the pressure and get the grip to twist the screw. The rubber band is compressed with a screwdriver which makes the grip strong. If the screw is stripped tightly then it is impossible to press the rubber band but still, it is useful sometimes.
Drilling
Drilling is the last stage it is not so big to drill the screw but the laptop screw is soft it might be damaged to the threads. Sometimes you can find the drill bit due to its smaller size, it becomes difficult. Use the metal bit and drill to the shallow depth, it is to put a small impression on the screw. now try to use the screwdriver and the rubber band process.
See lessWhich Of The Following Refers To The Case That Contains And Protects The Motherboard?
Which of the following refers to the case that contains and protects the motherboard? A) memory manager B) CP case C) system unit D) encapsulator Answer: The system unit is referring to the case that contains and protect the motherboard, it does not have the motherboard but the hard disk, electric cRead more
Which of the following refers to the case that contains and protects the motherboard?
Answer: The system unit is referring to the case that contains and protect the motherboard, it does not have the motherboard but the hard disk, electric component from the damage while in another computer the system is the separate component. This topic has a brief description of the system unit so read it to the end to get complete information on the topic.
What is a system unit and describe its component?
A system unit is also described as a tower that can define a hardware case that protects the computer’s main component or primary devices i.e., power, RAM graphics card, CD-ROM drive, hard disk drive, internal cables, CPU which form the entire computer as a functioning computer. The basic reason for the system unit is to protect the computer components also act as the insulator which protects the computer damage from the electricity.
System unit physically in a box form which has all the components related to electricity. Some say it is the CPU, it is also called the computer chassis, cabinet, box, tower enclosure, housing, etc.
Components of the system unit
Some of the components of the system units which are inside it are discussed in the following section:
Motherboard:
The motherboard is also known as the system board or mainboard, in the microcomputer, the motherboard is the main component.it has a different connector where other components can connect in different ways.IT has the CPU BIOS, memory, mass storage interfaces, expansion slots, parallel and series ports, and the control of the devices such as the keyboard, mouse, disk drive, etc.
Hard drive:
The hard drive has the maximum capacity, low volatile and a magnetic storage device along the volume drive attached which is not removed in any case. The data stored on it is magnetically written and read on a platter with the help of the read and write heads which are over the platter as a cushion of air.
Floppy disk:
The floppy disk function is the same as the USB drive in the modern days. The function is to read and write the floppy disk which is absolute nowadays.
Power unit:
The currents which are attained through the different computers are converted from the AC currents from the main source to the DC voltage. The power supply gives the output in watts and the max power transfer by power unit is 350 watts. the power supply increase with the components of the operating system.
CD ROM drive:
It is a high-capacity storage device that is removable and it writes the data onto and read from the storage medium. The CD ROM is attached to the computer through IDE(ATA), SCSI, S-ATA, FIREWIRE, OR USB.
See lessWhich Of The Following Statements Is True About Fiber?
Which of the following statements are true about fiber? It is present in plant and animal foods. It is the form of carbohydrate. Not digestible by the human enzyme. It can increase the calories density. It can bind some vitamins and minerals. Answer: The fiber is the carbohydrate form, it is not digRead more
Which of the following statements are true about fiber?
Answer: The fiber is the carbohydrate form, it is not digestible by human enzymes, it can also bind the vitamins and minerals. A diet is balanced when it has an adequate amount of food such as protein, vitamins minerals, carbohydrates, minerals fiber, water, mineral, and water.it provides strength, immunity and the bodyweight is balanced by protecting from overnutrition.
What are fiber and its benefits?
Fiber is a carbohydrate and it is not able to digest primarily from the plants such as the vegetable, fruits, nuts, and other and also animal food. It has two forms soluble fiber which is dissolved in water and insoluble fiber which does not dissolve in water. They are bound to vitamins and minerals which ac not be absorbed. The constipation is improved by its bye attracting the water in the colon and speeding the bowel movement and making it soft and bulky. The calories in fiber are quite low.
Soluble fiber:
The soluble fiber is dissolved in water such as the pectin, gum, and mucilage. It absorbs and converts into a gel-like form in the body.it can help in the glucose level in the body.
Insoluble fiber:
The insoluble fiber is hemicellulose, cellulose, and lignin the shape of it remains the same in the body .it can help the food movement easily in the digestive system.
sake of fiber:
Digestion:
The best goods of fiber are digestion in which fiber in dietary enhance digestion by a greater amount of stool bulk and being regular. Soft bulk easily passes than hard ones. Life becomes comfortable and also helps for colorectal health maintenance by the use of these softer stools. Hemorrhoids and diverticulitis risk can be avoided by the use of greater fiber in the diet.
Healthy heart:
Cholesterol level is lower by the use of fiber in the diet. The procedure of digestion requires bile acid. Bile acids are made from cholesterol. When dietary fiber is used digestion process increases liver force the cholesterol from bold to make more bile acid in this way bad cholesterol amount is decreased.
Regulation of blood sugar:
According to the Journal of American Board of Family Medicine, there is a relationship between glucose in blood and fiber. This journal states that when fiber in diet increases decrease the blood glucose levels during the test in which blood sugar level check after overnight fasting.
This article shows that HbA1c decreases with the increased use of fiber. It is glycated hemoglobin produced when blood sugar and protein are present in blood mixed.
Prevention of cancer:
A recent study on animals suggests that fiver have advantage cause if a person has the right kind and number of bacteria in the gut. In the lower colon fiber and bacteria reacts and sometimes a chemical is produced called butyrate that is responsible for cancer cell destruction. In some people’s butyrate are naturally present due to bacteria present in their gut and increase fiber in the diet help to increase the growth of bacteria.
See lessWhat Network Type Covers A Large Campus Or City?
Computer networks A network is the collection of the ports while the computer network is the connection of the multiple computers which are using the same protocols and share the resources. The network is established with the transmission media either cable or the wireless network. This article contRead more
Computer networks
A network is the collection of the ports while the computer network is the connection of the multiple computers which are using the same protocols and share the resources. The network is established with the transmission media either cable or the wireless network.
This article contains the content related to the computer network its types and their advantages and disadvantages. A question is also described here in this topic which is frequently asked What network type covers a large campus or city? That’s why read the article to the end!
Important types of the computer network
The types of computer networks are multiple and the categorization happens to depend on the size and the purpose of the computer network. The size is described in a way with the area and the computer requirement for the network to be built. Maybe it is for a one-room, office base or the company, etc. The types are described below:
MAN (Metropolitan area network)
MAN is the computer network that works for the city or the college campus etc., the network is bigger than LAN which covers only a single building. The area covered by the MAN is approximately ten miles.
Features of the MAN
Some of the features of the MAN are given below:
Pros of MAN:
Some of the pros are given below:
Cons of MAN:
The cons are discussed below:
PAN (Personal area network)
PAN is the network that is formed for the personal use of the individual. The devices which use the personal area network are mobile, tabs, etc., the pan forms the network between them to establish the transmission.
Characteristics of PAN:
Some of the following characteristics of PAN:
Pros and cons
PROS:
The pros of the PAN are in the following:
CONS:
The cons of the personal network are in the following:
What type of network covers a large campus or city?
Answer: Man (metropolitan area network) is the computer that connects the campus of the city with the help of the optical fiber or cable and the transmission medium and the range is about 10 miles max.
See lessWhich Of The Following Characteristics About Raid Is Incorrect?
What is RAID? RAID stands for redundancy array of the independent disk it is defined as the method to store data on various places to any kind of hard disks or any solid-state for the protection of the data in case of hazardous. Here a question has been asked what statement is incorrect about the RARead more
What is RAID?
RAID stands for redundancy array of the independent disk it is defined as the method to store data on various places to any kind of hard disks or any solid-state for the protection of the data in case of hazardous. Here a question has been asked what statement is incorrect about the RAID? In the elective paper. We have gathered the information about RAID what are the types, the pros and cons, and the working of the RAID. To know more detail about it scroll to the end.
RAID and its working
RAID is a way of the drives connected in a way that helps the speed and the performance rate of the drive, it is not for the personal computer it is used in servers and the high computer with greater functions. Different techniques are used in RAID.RAID cannot be used as the proxy for data storage which means if any kind of problem occurs the data backup can’t be stored in it.
There are different modes of the RAID which are discussed below:
RAID 0: It is also known as the stripped disks in which data is even between drives.
RAID 1: The Mirror disk with the same data in both drives.
RAID 3: Striped set with dedicated parity, the data is even between two or more and the dedicated drive.
RAID 5: Stripped disk with dedicated parity, the data is even between three or more drives the parity is between disk.
RAID 10: 1+ 0 striped sets of mirrored subsets four or more disks are made into two mirrors which are stripped.
Working of the RAIDS:
Raid put the data of various disk and allow the input and output operations to crossover in a balanced way, which cause the performance to improve. The multiple drives enhance the meantime of the failure to store the data redundancy which in return enhances the fault tolerance. RAID is the single logical drive operating system. Disk mirroring is also applicable with the help of the RAID.
Pros and cons of the RAID:
Pros:
The prose of the RAID is in the following:
CONS:
The cos of the RAID is in the following:
Which of the following characteristics of RAID is incorrect?
One high-capacity hard disk drive.
Answer: The correct statement about the characteristics of the incorrect RAID is one high-capacity hard disk drive.
See lessWhich Characteristic Describes Crosstalk?
Which characteristic describes crosstalk? The options for the crosstalk are given in the following section: Through fluorescent lights, the network signal may get lost. The disturbance of the message transmission from the carried signals in adjusted wires. Through the long cables, the signals mightRead more
Which characteristic describes crosstalk?
The options for the crosstalk are given in the following section:
Answer: The signal which is lost due to fluorescent light occurs by EMI and RFI. The signals through the long cable are disturbed due to the attenuation. While from the access point the wireless signal may lose over the large distance but the crosstalk is the disturbance of the message transmission from the carried signals in adjusted wires in the same cable.
What is crosstalk?
The crosstalk is the distraction or disturbance which occurs due to the electric and magnetic field by the telecommunication signals that disturb the signals in the adjoining circuit. Almost every signal has a different magnetic field and when they overlap, unwanted signals the capacitive conductive or the inductive coupling is the reason for the EMI (electromagnetic interference) which causes the crosstalk.
The reasons for the overlapping are with cabling structure, integrated circuit design, and different connectivity systems. Suppose two wire are close to each other and carry different signals, the current in them create the magnetic field which affects the signals in the neighboring wire.
Some of the examples of the crosstalk in different capacities of technology are in the following:
Crosstalk in the telephony
The crosstalk in telecommunication or telephony is defined as when talking on the phone there is some kind of leakage which mean through the nearby circuit the voices disturb someone else conversation over the phone.
The problem of the crosstalk in the business needs is very disturbing and it is reduced the help of the analog signals or the twisted pair cable which reduces the crosstalk effect.
Crosstalk in the cabling
In the cabling, the crosstalk is the EMI which happens due to the unshielded twisted pair cable to the other one, and mostly it happens as they are close to each other. The magnetic field of one wire disturbs the other one and it creates the crosstalk. There are different types of crosstalk in the cabling which are given below:
Near-end crosstalk
Near end crosstalk may also be known as the NEXT it is for the rejection of the crosstalk; it is in the inverse proportion of the crosstalk. The value present in the decibels per foot might vary due to the frequency in the process of transmission.
Far-end crosstalk
The fair-end is the interference measuring between two pairs of the cable .it is the interfering transmitter. to the cable far-end. The far-end may also know as FEXT.
Equal level far-end crosstalk (ELFEXT)
The ELFEXT is used to measure the attenuation compensation of the FEXT.
AXT:
AXT stands for alien crosstalk which determined the interference of the non-related cable which are nearby of the cable interest.
See less