Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In
Continue with Google
or use


Have an account? Sign In Now

Sign In

Continue with Google
or use

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Network Classmate Logo Network Classmate Logo
Sign InSign Up

Network Classmate

Network Classmate Navigation

  • Home
  • Article
  • Q&A
  • Guest Post
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Feed
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges

Maryam Khalid

Bronze
Ask Maryam Khalid
60 Visits
0 Followers
0 Questions
Home/ Maryam Khalid/Answers
  • About
  • Questions
  • Polls
  • Answers
  • Best Answers
  • Asked Questions
  • Followed
  • Favorites
  • Groups
  • Posts
  • Comments
  • Followers Questions
  • Followers Answers
  • Followers Posts
  • Followers Comments
  1. Asked: September 16, 2021In: Q & A

    A Router Boots And Enters Setup Mode. What Is The Reason For This?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on October 31, 2021 at 2:06 pm

    A router boots and enters setup mode. What is the reason for this? The image of the IOS is damaged. From the flash memory, the Cisco IOS is missing. The configuration file is missing from NVRAM. The hardware failure is detected by the POST process. Answer: If the startup-config file is missing and tRead more

    A router boots and enters setup mode. What is the reason for this?

    • The image of the IOS is damaged.
    • From the flash memory, the Cisco IOS is missing.
    • The configuration file is missing from NVRAM.
    • The hardware failure is detected by the POST process.

    Answer: If the startup-config file is missing and the router cannot detect it then it enters the startup mode and boots and permits the configuration to enter from the console device.

    What is a router?

    A hardware type that is built to transmit, receive and analyze the data packet from the other network. Another function of the router is to transform the packets to the interface of the other network, drop it and do the work of the other network. The router shows the direction to the data packet which are sent to the destination network over the internet.

    The router can connect the data with a different IP address such as the data come and the router read the address of the destination network in the header of the packet to and send the data packet towards it. The common type of the router are the ones for home and the office which transfer the data from the home computer and the internet

    Functions of the router

    The router is more capable of doing functions related to the other hardware devices i.e., Hub and the Switch which also perform functions of the network. The hub works is to transmit the data and has nothing to do with the analysis of the data, But the router not only sends the data but also checks its package either it is safe or not changes it, and then transfers it to the destinated network.

    A software run the router and it has two operations in the process which is listed below:

    Control Plane:

    A routing table has the information of the routes which are taken by the data packets and which physical interface. The process happens by the configuration of the static or the dynamic using different protocols. Both of the routes are in the table, the control plane uses the directive from the table developed the FIB which is further used by the forwarding plane.

    Forwarding plane:

    The data movement forward happens with the help of the forwarding table. The packet header analyzes by it then matches it with the destination entries which are provided by the FIB control plane and transfer the packet to the FIB specified network.

    Types of the router

    Some of the router types are discussed in the following:

    Wireless:

    The work of the wireless router is to provide the internet to phone, laptops with the help of wireless signals. An ethernet routing has also been provided by it. Sometimes the router act as the combo of the router and modem which transform the coming broadband signals. the range of the WIFI router is 150 feet and outside it is 300 feet.

    Brouter:

    The Brouter is known as the bridge router which is the combo of the bridge and the router in the data transmission.

    Core Routers:

    The works of the core network are to transmit the packet of data within the network and not to the other network which is outside.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  2. Asked: September 16, 2021In: Q & A

    What Are Two Functions Of A Router? (Choose Two.)

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on October 31, 2021 at 2:02 pm

    What are the two functions of a router? (Choose two.) The data low maintenance is done by the router. The segmentation at the second layer is provided by the router. The router establishes a connection between multiple IP networks. The best path for the packets is determined by it. The routing tableRead more

    What are the two functions of a router? (Choose two.)

    • The data low maintenance is done by the router.
    • The segmentation at the second layer is provided by the router.
    • The router establishes a connection between multiple IP networks. The best path for the packets is determined by it.
    • The routing table was established based on the ARPA request.

    Answer: The router establishes the connection for multiple networks and finds the best route for the data packets and transfers them to the destination port.

    Now that you know the answer but let’s take a look at the other function of the router because these are the reasons that the router has been built in the first place. We have discussed them in the following article so stick to the end of the article.

    Router and its functions

    The router is the hardware device that is for the connection with the network .it also finds the best path for the data packets so that the packet went straight to its destination address. The router is for access to the internet and connects the office with the help of the virtual private network. Router use different types of a protocol such as the Ethernet, ATM, DSL, etc., router along the IP protocol use the various other protocol as well.

    Functions of the router 

    The router’s functioning is split into two different paths first; is to build the map and second use the static and dynamic protocol for that particular router. The dynamic protocol allows the router to tell the different networking devices not only about the topology but the different changes in the network as well. While the static routing is adamant and does not allow any kind of changes or is rather able to adapt them. The task for building the map with the help of a routing table is done by these two protocols.

    As the router has different interfaces through them it receives the data. The network address is analyzed by a router, the address of the packets after then it decides the interface to forward that particular packet. The routing table is helpful in the decision making

    Some of the router functions are discussed in the following section:

    • The broadcasting of LAN is managed by it.
    • It acts as the default gateway.
    • Protocol translation is done by the router if needed.
    • Data transfer to another network.
    • Determine and learn the loop-free paths.
    • Show the best path so that the packets reach the destination address.
    • The IP packets which are attached to the computer on a different network will be sent from one subnet to another with the help of a router.
    • The router acts as a firewall: the firewall protects the network from intrusion and threats .it can block unwanted and unauthorized access or traffic. The firewall software is installed on the computer but the router is determined with firewall firmware and software.
    • The router is responsible for segmentation it sent the data packet from the internal network to the internet,it also protects the data so that any kind of damage may not occur.
    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  3. Asked: September 16, 2021In: Q & A

    What Is The Decimal Equivalent Of The Hex Number 0x3f?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on October 31, 2021 at 2:02 pm

    What is the decimal equivalent of the hex number 0x3f? 0x3f is a hexadecimal number because it starts with the 0x these are not used in real life but sometimes they are used for certain things i.e., HTML colors, determining the errors in the code, short the binary numbers, and the math’s exercise. TRead more

    What is the decimal equivalent of the hex number 0x3f?

    0x3f is a hexadecimal number because it starts with the 0x these are not used in real life but sometimes they are used for certain things i.e., HTML colors, determining the errors in the code, short the binary numbers, and the math’s exercise. The decimal equivalent of the hex number 0x3f is 63.

    The explanation of the decimal 63 of hex number 0x3f is in the following article. We have also mentioned the decimal number while the decimal equivalent of the hex number. So read the topic or answer to the end.

    What is the hexadecimal number?

    The symbols in the hexadecimal consist of the 16 which include digits and alphabets such as 0,1,2,3,4,5,6,7,8,9, A, B, C, D, E, F in it the A=10, B=11, C=12, D=13, E=14, F=15.the purpose of the 0X is to demine that the particular number is the hex number.

    Let us take a look at how to convert the hex 0x3f into decimal, just focus on the number 0x and 3f. the step for the conversion is in the following:

    STEP 1: Multiply the number in order:

    • First digit with 1.
    • Second to last with 16,
    • Third to last digit with 16 x16.
    • Fourth to last with 16x16x16.
    • Continue the multiplication until no digit is left.

    Step 2: Sum all the answers you got by multiplying the digit to find the answer of 0x3f in decimal.

    Now you know the method let’s find the answer by practically in the following:

    Fx1=15.

    3×16=48.

    15+48=63

    Hence the answer to the decimal equivalent of hex number 0x3f is =63.

    what do you know about the equivalent decimal?

    In mathematics, the equivalent decimal is the decimal numbers that are equivalent and they shoe the same value. Both the number show the same amount of space which is taken by them. Such as the 0.1 which is one-tenth is the same as the 0.10 ten hundredths. A mode which is given below helps you to understand the equivalent decimal:

    As we know that 0.1 and 0.10 are equal because each tenth part is divided into ten equal parts, while if we split the hundredths to ten equal parts it will have 0.100 which is equivalent to 0.1.few concepts about decimal equivalent is important such as:

    • A difference of 0.1,0.10 and 0.100 must know because the place value shows the parts of an overall which get shorter from tenths, hundreds to thousandths we are moving toward the right of decimal point with position 10 times small.
    • Second,0.10 and 0,100 can simplify to 0.1 the extra zero in the right of 0.1 is the placeholders and represent the particular place value of the decimal digit.

    Some of the examples of the equivalent are:

    0.3 =0.30 ,0,19= 0.190 ,0.14=0.140 

    Simply the zero to the right of the last number apart from the zero of 1-9 is the equivalent decimal to the equal decimal digit without zero.

    0.2 = 0.20

    0.44 = 0.440

    0.791 = 0.7910

    0.2 = 0.200

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  4. Asked: September 16, 2021In: Q & A

    Why Does The Router Respond With The Startup-Config Is Not Present Message?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on October 31, 2021 at 1:50 pm

    Why does the router respond with the startup-config is not present message? Answer: The router responds with the message because the file is present in the RAM and not saved in the NVRAM when someone wants to save it in NVRAM. Let us discuss the configuration of the default router, the verificationRead more

    Why does the router respond with the startup-config is not present message?

    Answer: The router responds with the message because the file is present in the RAM and not saved in the NVRAM when someone wants to save it in NVRAM.

    Let us discuss the configuration of the default router, the verification of the initial router configuration, and save the running file.at first, the router configuration begins and with the help of the encrypted and text message you would secure the CLI and console port, the message configuration with the help of the login is also performed in this topic. In the end, you would learn to save the running file.

    Configuration of the default route:

    1. Create the console connection with R1
    • Select the console.
    • Tap on PCA and choose RS 232.
    • Tap R1 and choose console.
    • Tap on PCA>desktop tab> terminal.
    • Tap on OK and press enter.
    1. Step on the privileged mode and determine the recent configuration.

    Because there are many configuration commands that’s why it needs to be protected with passwords and the username to prevent the unknown person who has no access to it.

    1. With the help of the enable command enter EXEC mode.
    • Router>enable.
    • Router #.
    • Focus on the prompt change in the privileged node configuration.
    1. Step on show running-config command:
    • Router # show running-command,
    1. Give the explanation of the question:
    • The router’s name.
    • The number of fast ethernets the router has.
    • The gigabit of the ethernet.
    • A number of the serial interface of the router.
    • Range of the vty line.
    1. Show the content of NVRAM.
    • Router# show startup-config.
    • Startup-config.

    Verification and the configuration of the initial router:

    For the configuration, you have to go to the different modes so always focus on the prompt change of the router.

    1. Determine the setting of R1.

    a.R1 the hostname.

    b.Use the following password:

    • Console: letmein.
    • Privileged EXEC unencrypted: cisco.
    • Privileged EXEC encrypted: itsasecret.

    c.Transform or encrypt the text.

    d.Type message: an unauthorized person is not allowed.

    2. Verify the R1 setting:

    1. Check the setting by the look of the R1 configuration and the command for it is shown running-config.
    2. Type the recent session of console until:
    • R1 con0 is present.
    • Tap return to start it.

    3. Press enters and the following messages are displayed:

    • An unknown person is not allowed.
    • password.
    • Use the verification for access.

    Save the file currently running

    Step 1: Save the file which is configured to NVRAM.

    1. As you have already determined the initial R1 setting move toward the configuration of the running file in NVRAM to make sure the changes are saved if the system is damaged.
    • What is the command to save the configuration to NVRAM? Copy running-config startup-config.
    • The short version of the command? Copy r s.
    • The command for the NVRAM content: show startup-configuration or show start

    2. Check that the changes are recorded and if it is not the situation then check the output and check the missing command and if it is entered incorrectly.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  5. Asked: September 16, 2021

    If The Default Gateway Is Configured Incorrectly On The Host, What Is The Impact On Communications?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on October 20, 2021 at 9:36 am

    Default gateway A default gateway act as a gate between the devices that want to communicate with each other. When the message is transferred to the destination first the request went toward the default gateway and then it will move toward the Local network (LAN). The default gateway is an intermediRead more

    Default gateway

    A default gateway act as a gate between the devices that want to communicate with each other. When the message is transferred to the destination first the request went toward the default gateway and then it will move toward the Local network (LAN). The default gateway is an intermediate device between the network and the local area network.

    In an easy way when the devices want a transmission other than their network, they need a default gateway. The devices which are used as a default gateway are the routers or switches (multiple switches). It is a node in a network that uses the protocol which acts as the host for another network in a case when no route is the same as the destination IP address of the packet.

    The main purpose of the default gateway is to allow access to the requested web pages cause the request is sent toward the gateway before the internet. The gateway is the intermediate device and the key other than the original is used for the device’s connection on one subnet. The gateway ensures the packet transmission to its destination even the source and the destination used other protocols.

    When the message or packet transfer the request will reach the routing table to find the most suitable and efficient path and the destined router, the gateway also receive the request who has no destined router and ensure the flow of the request as well.

    How to find the default gateway?

    The process is to find the default gateway in the windows computer while in the MAC book it is different. Now let’s start with the procedure:

    • In the window search for the command prompt for that tap on the search bar and type the CMD and double tap on it. If you can’t be able to find the command prompt with this method then press the window key by pressing the R key along with it. The run menu came up with this process than type the CMD and click OK.
    • In the black window which is the CMD window type ipconfig and then TAP on the ENTER button and the information related to the network will display.
    • Scroll down you can find the default gateway along with the IP address.
    • Once the gateway is found then on the web browser paste the IP address on the search bar and click on ENTER.
    • A box will display demanding the router username and password.it will also show on the router.

    If the default gateway is configured incorrectly on the host, what is the impact on communications?

    • The host can’t communicate with the local network.
    • Communication is not affected.
    • The host can be able to communicate with others on the local network but can’t communicate with others on the remote network.
    • The host can transmit with the remote but cannot communicate with the local network with another host.
    • A ping of 127.0.0.1 will never succeed.

    Answer: the host will be able to transmission with another host on the local network but cannot communicate on the remote network because to communicate outside the network the default gateway is necessary and if it is configured incorrectly the impact or transmission will never happen.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  6. Asked: September 16, 2021In: Q & A

    Why Would A Technician Enter The Command Copy Startup-Config Running-Config?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on October 20, 2021 at 9:35 am

    Why would a technician enter the command copy startup-config running-config? IOS control the device's performance and its behavior. The interface is determined by Cisco which is a command-line interface that is used for performing the different tasks on the system with the help of the commands. TheRead more

    Why would a technician enter the command copy startup-config running-config?

    IOS control the device’s performance and its behavior. The interface is determined by Cisco which is a command-line interface that is used for performing the different tasks on the system with the help of the commands. The command line is used with different methods such as console, telnet. And secure shell.

    There are different commands used by the Cisco IOS and it has different modes as well. we will take a look at these points along with the answer to the question: Why would a technician enter the command copy startup-config running-config? Let’s get started with the discussion!

    Modes of the Cisco:

    Cisco has different modes and users can be logged with the help of them into the devices. The modes are listed below in the following:

    User Exec mode

    This mode gives the user the authority to see a thing but he/she cannot be able to change anything. The users can access this mode by any of the command line methods.

    Enable or privileged exec mode

    The user can use the commands which are highly privileged such as reload the system and the whole system reboot. the command for this access is the Enable command.

    Global configuration mode

    The global model is quite distinguishable from the enable and user exec mode. In this, the configuration commands are accepted such as it tells the switch what to do and how to do it. The user can enter into configuration mode and update them but the changes only occur when the system reboots. For the configuration mode, the basic command is conf t and the modes have subcommands as well.

    Storage of the configuration files

    The configuration command is used by the cisco devices for work, and these devices have RAM in which the commands stores but sometimes due to mishap the storage may corrupt so the files are places in various other places which are given below:

    ROM: The Rom stores the files for the reboot system which works only when the system is turned on.

    RAM: the files which are in the running stage especially configuration files are stored in the RAM.

    NVRAM:  The startup file which is useful when the system is reloaded are stored in the Nonvolatile RAM or NVRAM.

    Flash device: The files are stored in portable devices; the device contains the images and the location of the Cisco IOS boot time.

    Task performs with the help of the configuration commands

    The task which is performed by the help of the configuration commands are in the following:

    Rename:

    The device name can be changed with the help of the hostname newname command is used. The new name is attached to the string which is specified by the user.

    Save running-config

    The command copy running-config startup-config is used to save the current file runs in the configuration.

    Copy:

    The files on the cisco device are copies with the help of the command copy startup-config running-config, the copied file is stored in the RAM, NVRAM, AND THE TFTP server. The command overwrites the existing file with the new file destination.

    The technician runs the copy startup-config running-config to copy the existing configuration in the RAM. The purpose of it is to copy the previous file into the RAM from NVRAM for changes.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  7. Asked: September 16, 2021In: Q & A

    Which Subnet Mask Would Be Used If 5 Host Bits Are Available?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on October 20, 2021 at 9:34 am

    Which subnet mask would be used if 5 host bits are available? Each device has its unique IP address no other device has the same address as any other device because the IP address is used for the device identification on an IP network. The IP address has 32 bits and it is broke into the pieces suchRead more

    Which subnet mask would be used if 5 host bits are available?

    Each device has its unique IP address no other device has the same address as any other device because the IP address is used for the device identification on an IP network. The IP address has 32 bits and it is broke into the pieces such as the host portion and the network portions with the help of the subnet mask.

    The subnet mask is used in the process of subnetting. A question that is common about subnet masks and frequently asked in an exam is: Which subnet mask would be used if 5 host bits are available? However, we are going to discuss the subnet mask and its working. With the help of this, you can easily determine the answer to the question. Without delay let’s begin with the topic!

    The subnet mask and its working

    A subnet mask divides the IP address into the host portion and the network portion. it can define the range of the address of IPs within the network. The subnet mask identifies the parts of the IP addresses the mask are not visible when the packets are traveling along with the internet, instead they have the destination addresses of the router which has the same address as the subnet mask.

    There is two forms of the subnet mask which are listed in the following:

    Default subnet mask:

    The default mask has been designated for only the single network in the relatively class, the number of the bits is destined for the address class.

    Custom subnet mask:

    The custom subnet mask as the name suggests it is customized by the administrator and can be accessed or accommodate many networks.

    Subnetting

    The process of the break the network is the subnetting, the subnet mask work with subnetting. by maintaining the subnet mask the IP address number can be adjusted within the available network. subnetting create multiple networks in classes A, B, C if the subnetting does not happen then you can only use one network in the relatively classes. To form the subnetwork ID, you need to enlarge the natural mask by adding the bits to the host portion of the address.

    The common subnet mask of the home is 225.225.225.0 it can be elaborated in a way that the subnet mask gives the authority up to 254 IP addresses to be used in the network .in a simple way 254 devices are connected to the network and access the internet. With the help of the subnet mask, the other devices can determine that either it is connected to the same network or from another network.

    Let’s take a look at the example to determine the network portion and the host portion. let’s assume the subnet mask is 255.255.255.0 if we convert it is the binary form then it is 11111111.11111111.11111111. 00000000. while the IP address is 192.168.0.101 and the binary form is 11000000.10101000.00000000.01100101

    It is simple to differ the network part and host part the binary form of subnet mask 1 indicates that the same bit of the IP address is the network portion which means the first three octets in the IP addresses is the network part, so the part 192.168.0 is the network part and 101 is the host portion.

    The subnet mask of the 255.255.255.224 is used when the 5 hosts bits are available because the 255.255.255.0 has 8 host bits while the 255.255.255 .240 has 4 bits and 255.255.255.128 has 7 host bits.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  8. Asked: September 16, 2021In: Q & A

    Refer To The Exhibit.Which Route From The Pc1 Routing Table Will Be Used To Reach Pc2?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on October 20, 2021 at 9:34 am

    Routers are the need of this world in which the internet and the connections are the basic needs of human life. The router is used to connect the devices which are separated from each other at a very large distance. The router uses some of the algorithms or methods to route the data from one end ofRead more

    Routers are the need of this world in which the internet and the connections are the basic needs of human life. The router is used to connect the devices which are separated from each other at a very large distance.

    The router uses some of the algorithms or methods to route the data from one end of the device to the other end of the connected device. The router connects the devices with the help of the cable such as the fiber optics with some standard bandwidth. The main advantage of the routers is that it prevents the disturbance when someone is connected router stops the interference.

    IP routing

    Routers have different phenomena in the process of routing the packets. Ip routing is one of the phenomena, it is the process of the packet’s transmission from one end to another with the help of the IP addresses. The router’s role in this is to identify the IP address of the destination device and then route the packets toward it.

    Routing table 

    The routing table is the other phenomenon it is used to help the router to identify the IP address and the next-hop address of the destination device. Different types of routes are formed in the routing table and the values in the routing table contain the destination address, metric, gateway, subnet mask face, and interface. All of them have their values and are essential to transfer any packets in the process of routing.

    Let’s take a look at the values which are needed in the routing table path in the following:

    Default Gateway

    The default gateway is the router and it is used in that system where the destination device has no next-hop address and the packets have no other way to arrive in the network.

    That’s why the host is maintained in a way that the packets in the network first go toward the default gateway. The gateway then transfers the packets by giving them the path or route toward the source end host.

    Metric

    For a specific interface of the network, the metric is allocated to the Route of the IP.it determines the weight or cost of the route. The metric determines whether the path is good and effective or not. The metric may the speed of the network or the amount of time the packets reach toward the destination.

    Subnet mask 

    The subnet mask is used to identify the network address and the host address when the IP address is distinguished into pieces by the process of the subnetting. The subnet mask has the table itself where the values are different for the classes if the TP addresses.

    A question is common in the exams related to the routes in the routing table and it is listed here with the explanation in the following:

    Refer to the exhibit. Which route from the PC1 routing table will be used to reach PC2?

    A table with the values such as the destination network has 192.168.10.0., the netmask has the value 255.255.255.0, the gateway has the on-link value, the value of the interface is 192.168.10.10. and the metric with 281 value, used to help the PC1 routing table to PC2.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  9. Asked: September 16, 2021In: Q & A

    Which One Of The Following Is An Example Of A Logical Access Control?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on October 20, 2021 at 9:34 am

    Logical access control In the world of advancement where new technologies are emerging every day, logical access control is one of them. as the name suggests it is related to logic and algorithms .in simple is an automatic system that gives the person an authority to access the resources of the compRead more

    Logical access control

    In the world of advancement where new technologies are emerging every day, logical access control is one of them. as the name suggests it is related to logic and algorithms .in simple is an automatic system that gives the person an authority to access the resources of the computer system i.e., database, files. Since its logical question is common in the elective exams Which one of the following is an example of logical access control?

    The question is raised because there is another access system which is the physical access control. These two are the opposite of each other. in this article we are going to mention both of them and their difference. So, let’s begin with the topic!

    What is access control?

    Access control provides the authority which allows us to see some things while others are hidden from us because they are secured in the computer system. it is quite effective because it can reduce the security issue related to someone’s privacy.

    The access has two types or forms one is physical access control while the other one is logical access control. The simple objective of the physical access is to protect the buildings etc., while the logical access provides the security for the system, its data, etc. The control checks the authenticity, authority of the user with the help of the login details i.e., username, password, etc.,

    Logical and physical access control 

    Logical access control provides security with the help of authentication, identification, and authority over the computer system. Logical access is used for access over the hardware devices and it is in contrast with physical access, which can interact with the system where the instruments are needed for security.

    The logical access has the commands for the programs, process, and system security, and they are stored or fixed in an operating system, security packages, or in a database. The logical and physical access has a very tinny difference for example those with the card and the pin code of the card can enter into the room where the physical access is attained with the help of the card while the logical access attained when the pin of the card is known that means the physical and logical both are necessary for security system.

    For security different ways are used i.e., the password system, encryption methods, or the software which can determine any kind of threat and the intruder in the system.

    The physical access control provides security in a way that it can prevent someone from entering the building or any other place.it is used for the protection of the property from an unauthorized person. for example, to enter a company the ID card is given to employees, the information that they are related to the particular company is stored in form of the chip on the card and without it, they can’t be entering the building.

    Which one of the following is an example of logical access control?

    • Password
    • Locks and key
    • Id cards
    • Fence

    The password is the correct answer because it is the logical access control and without, no one can enter into the particular system while the other is used for the physical access control.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  10. Asked: September 16, 2021In: Q & A

    What Component Of A Motherboard Is Not Considered To Be A Field Replaceable Unit?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on October 20, 2021 at 9:33 am

    Motherboard and its components The motherboard of the computer establishes the connection between the various parts of the computer.it is the backbone of the computer without it the connection is not possible and the computer does not work as well. The parts are hard disk, RAM, processor the externaRead more

    Motherboard and its components

    The motherboard of the computer establishes the connection between the various parts of the computer.it is the backbone of the computer without it the connection is not possible and the computer does not work as well. The parts are hard disk, RAM, processor the external cards all are plugged into the motherboard.

    The motherboard is the hub of the computer it has various names such as the system board, logic board, etc., It has different components which are characterized in three different ways.

    Motherboard location

    The motherboard is present in the mobile, laptop, and pc. Simply it is present in every form of the computer but in all the location is different.

    In PC: The motherboard is in the rectangular case; inside it, the red/blue/green color plate is the motherboard.

    In laptop: if the laptop is open from the bottom the motherboard is located in front of it.

    In mobile devices: The back of the mobile devices when you open it then the motherboard will become visible to you.

    Motherboard components characterization

    The motherboard is divided into components based on the character and they are listed below:

    Form factor:

    The form factor related to the dimension, electrical needs the arrangements of the motherboard. The ATX is the latest technology of the motherboard in the computers.

    Chipset:

    The chipset is used to connect and manage the resources i.e., the cache memory, RAM, the expansion cards, etc., the data transfer between the computers is managed by the chipset.

    The socket for the processor 

    The processor is organized into the connector which is known as the processor socket. The BIOS and CMOS are all are in the processor socket.

    Components

     The components of the motherboard are various but a few of them are listed below:

    Mouse and keyboard:

    The mouse and the keyboard are connected on the motherboard with the help of the connector which is USB and the PS/2 connector

    USB:

    The USB is the port on the motherboard which is for the connection of the devices which are external such as the mouse, scanners, etc. to the motherboard. The devices which are connected with the USB can easily be removed.

    RAM ports:

    RAM stands for the random-access memory the slots of the RAM are for its connection with the computer. on the outer, the slots are two while inside of the motherboard there are 4 slots for RAM.

    Chip for CPU:

    The CPU is also connected to the motherboard with the help of the chip it is the brain of the computer all the work of the system are done with the help of the cup (central processing unit)

    PCI slots:

    The PCI slots are used to connects the cards for expansions into the system. The cards such as Sound cards, video cards, network cards. But the latest system doe not need the PCI slots.

    Though you have learned about the motherboard and its components then a question is arising related to its which is listed below:

    What Component of a Motherboard Is Not Considered to Be A Field Replaceable Unit?

    The component which is not considered as the field-replaceable unit is the Chipset of the system.

     

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
1 … 23 24 25 26 27 … 29

Sidebar

Top Members

Shailendra Yadav

Shailendra Yadav

  • 2k Questions
  • 52k Points
Level 50
Sneha Singh

Sneha Singh

  • 2k Questions
  • 41k Points
Level 40
Nilay Sharma

Nilay Sharma

  • 0 Questions
  • 33k Points
Level 30
  • Popular
  • Comments
  • Farwa Khalid

    Half Duplex Versus Full Duplex

    • 3 Comments
  • Shailendra Yadav

    Troubleshooting with TR-069 ACS for ISPs 

    • 0 Comments
  • Farwa Khalid

    What Is Ping Spoofing

    • 0 Comments
  • Farwa Khalid

    What Is Wireless Isolation?

    • 0 Comments
  • Farwa Khalid

    What Is Radio Network Controller?

    • 0 Comments
  • What is Circuit Switching - Network Classmate
    What is Circuit Switching - Network Classmate added a comment […] needs to be established. It is additive into two… November 30, 2022 at 11:36 am
  • Difference Between Router And Switch - Network Classmate
    Difference Between Router And Switch - Network Classmate added a comment […] router works in the full-duplex transmission mode. However, we… November 30, 2022 at 11:36 am
  • Communication Protocols - Network Classmate
    Communication Protocols - Network Classmate added a comment […] receiver. It is two wired protocols. Rx and Tx… November 30, 2022 at 11:35 am

  • Home
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges




Footer

Important Links

  • Home
  • Article
  • Q&A
  • Guest Post

Useful Categories

  • Basic Networking
  • Basic Security
  • CCNA R & S
  • CCNA Security
  • Download

Legal Stuff

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • User Data Policy

Social Links

  • Facebook
  • Instagram
  • Twitter
  • Telegram
  • Linkedin

Copyrights © 2023 Network Classmate™. All Rights Reserved.
Designed by LeadsNut

Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}