Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In
Continue with Google
or use


Have an account? Sign In Now

Sign In

Continue with Google
or use

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Network Classmate Logo Network Classmate Logo
Sign InSign Up

Network Classmate

Network Classmate Navigation

  • Home
  • Article
  • Q&A
  • Guest Post
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Feed
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges

Maryam Khalid

Bronze
Ask Maryam Khalid
54 Visits
0 Followers
0 Questions
Home/ Maryam Khalid/Answers
  • About
  • Questions
  • Polls
  • Answers
  • Best Answers
  • Asked Questions
  • Followed
  • Favorites
  • Groups
  • Posts
  • Comments
  • Followers Questions
  • Followers Answers
  • Followers Posts
  • Followers Comments
  1. Asked: September 16, 2021In: Q & A

    Why Are Two Strands Of Fiber Used For A Single Fiber Optic Connection?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on October 1, 2021 at 11:49 am

    Why are two strands of fiber used for a single fiber-optic connection? The two strands of the optical fiber are used for the optic connection because it allows the data flow for a long distance, it prevents interference during the connection. It allows the full-duplex connection because in the fiberRead more

    Why are two strands of fiber used for a single fiber-optic connection?

    The two strands of the optical fiber are used for the optic connection because it allows the data flow for a long distance, it prevents interference during the connection. It allows the full-duplex connection because in the fiber optic the light travels only in one direction at a time so the two strands are needed for it.

    Optical fiber and its working

    The latest technology is used for the transmission of the data using the light from the cables which are made of glass or plastic. Mostly the metal wire is suitable for the optical cable because the signal travels with less damage. Total internal reflection is used in the fiber optics cable. According to the transmission distance and power requirement, the optic cable is designed and allows the propagation of the light. The fiber optics have different types in which the single mode is for longer distances while the multimode is for a shorter distance.

    Types of fiber optics 

    The optical fiber type is defined with the help of the refractive index, propagation, and the material of which it is made. the division is listed below:

    Step index graded fibers: It consists of the single index of refraction and the cladding surrounds the core.

    Graded index fibers: The distance from the axis raise the refractive index will decrease gradually.

    Glass fiber: The fiber cable is made up of glass.

    Single-mode fiber: The single mode is for long distances.

    Multimode: The multi-mode is used for the transmission between short distances.

    Operations of the optical fiber

    The fiber optics work according to the total internal reflection as the light transfers a large amount of data in a straight line, so if there is no bend in the cable it will be a difficult task to handle the data. That’s why the fiber optic is bendable, it can bend all the waves inward. The waves will bounce back in the fiber optics due to internal reflection.

    The optical fiber signals are also lost and degrade but it is much less than the metal cables. The system of the optical fiber has different components such as:

    Transmitter: the signal is produced with the help of the transmitter and makes them ready to transmit.

    Optical fiber: it is used as the medium for the transmission of the signals.

    Receiver: the signal from the transmitter is decoded with the help of the receiver.

    Regenerator: It is used for long-distance transmission.

    Advantages and disadvantages of fiber optics:

    The advantages of fiber optics are in the following:

    • It has higher bandwidth.
    • Light travel in a long distance.
    • Interference is less in optical fiber.

    The disadvantages of the optical fiber are:

    • It is quite expensive than copper wire.
    • The glass fiber is over-sensitive.
    • Installation is difficult.

    Uses of fiber optics

    Fiber optics is used in different areas which are given below:

    • Military services for communication.
    • Broadcasting by means of transmission.
    • In the field of medical science for accurate vision.
    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  2. Asked: September 16, 2021In: Q & A

    What Type Of Information Is Included In The Transport Header?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on September 28, 2021 at 12:40 am

    What type of information is included in the transport header? The transport layer of the OSI model is the essential component for moving the information in the form of the packet from one device to another. The transport layer includes the headers and these headers have some information stored. ThisRead more

    What type of information is included in the transport header?

    The transport layer of the OSI model is the essential component for moving the information in the form of the packet from one device to another. The transport layer includes the headers and these headers have some information stored. This is the topic in which we are going to answer what kind of information is includes in these transport headers? And What are the names of these headers?

    Transport layer 

    The transport layer is responsible for the connection of TCP( transmission control protocol) and UDP (user datagram protocol) and Networks hosts. the data send and receive to and from the application with the help of this layer on the hosts. On the hosts, the layer addresses the port number to the processes that happen in the application and also adds the header TCP and UDP when the message is received with detailed information of origin and destination from the applications.

    Few applications require the TCP protocol i.e., SMTP, HTTP while the other work with UDP.

    An authentic and arranged frames delivery is essential for some applications and it is available in TCP. The determination of the errors, resending the packets, and the acknowledgment are used by TCP. UDP is used for faster transmission by some of the applications.

    Segmentation of the TCP

    A segment is useful for the determination of the deportation of the receiving system. when the TCP is ready for the connection, it sends the frames or segments called SYN to the protocol on the receiving side. Then the TCP of the receiving sends the ACK segment to ensure that SYN is received. Then the connection is established between the source and destination.

    UDP

    unlike the TCP does not need to check the arrival of the frames to the destination. The message is converting into the form of UDP packets. Then the UDP header is connected to the frames. The header has the information of sending and receiving ports. The source-side tried to send frames to the destination side. The acknowledgment is determined by the application layer. UDP does not need the guaranteed check that the information is received at the destination.

    The header of the transport layer

    Transport layer header is of two one is TCP header while the other is UDP header. The information which is involved in the header is the port numbers of the source and destination. The TCP requires additional information for the effective delivery of data. The address of the physical is in the frame header. In the header of the network, the logical address is stored. Application data resides at the top of the protocol stack.

    Final words 

    The transport layer is necessary to establish the connection between the source and the destination and it happens with the help of the protocol such as TCP, UDP. the protocols have the headers in is in the frame and the other one in the network. these headers have the information of the port address of the source and destination which is need for the connection.

     

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  3. Asked: September 16, 2021In: Q & A

    What Are Two Functions Of End Devices On A Network? (Choose Two.)

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on September 28, 2021 at 12:40 am

    What Are Two Functions of End Devices on A Network?  The flow or transfer of the message may be so simple such as connecting a device with the help of a single cable or it might be complex in connecting the networks which cover the whole world. the infrastructure of the networks gives a suitable andRead more

    What Are Two Functions of End Devices on A Network? 

    The flow or transfer of the message may be so simple such as connecting a device with the help of a single cable or it might be complex in connecting the networks which cover the whole world. the infrastructure of the networks gives a suitable and secure environment for communication between the devices or networks. And the infrastructure is divided into components such as in the following:

    • End devices.
    • Intermediate devices.
    • Network media.

    The purpose to discuss the network infrastructure is to understand the end devices and the component of it .so if someone wants to know about what are the end devices in the network? Or what are their functions? The basic concept is mandatory to evaluate. Now let’s begin with the end devices and their functions.

    End devices 

    In the network infrastructure, the end devices are like node devices that act as the origin point or the destination when a conversation occurs between the networks. Due to the advancement in technology the nodes now act as either, servers, clients or maybe they act as both at a time. The whole network mostly depends on these nodes for communication between them. End devices manage the information flow to the exact destination with the help of the specific addresses which are allocated to them. The role of the nodes is determined by the software which is installed in their structure in the network. Roles of the end devices as a client and server are discussed below:

    As a client:

    The end devices as a client work on the requesting of the data from the source and display the collected data according to the request on the screen. It is used by the end clients.

    As a server:

    The specifics programs which provide information and the requested services to the other nodes in a network such as the web servers or email etc.

    Two main functions of the end devices on a network

     Now that you understand what are the end devices so the two functions of the end devices on the network are in the following:

    • End devices are responsible for the origination of the data transfer or the flow over the computer network.
    • The devices act as an interface between the users (humans) which are actually known as the end-user and the communicating networks.

    Few Examples of the devices

    Few  examples of the end devices are in the following:

    • Mobile devices.
    • Laptops.
    • Tablets.
    • Desktop computers.
    • Workstations.
    • Servers.
    • Security cameras 

    Closure 

    End devices are one of the components of the networks which has a role in the conversation over the networks or between the devices. End devices are an originator which is responsible for the information flow between the devices having nodes and is the interface that helps the communication of the humans with the other devices locally or globally. Without it, the network will never work alone and fell apart.

     

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  4. Asked: September 16, 2021

    When Using The Windows Encrypted File System

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on September 28, 2021 at 12:40 am

    In today’s world where the security is the most important factor for electronic devices because it has a great impact on them.  A lot of the security checker is available in the world and at the same time encryption is the best among them all for the security. Encryption is like a guard for privacyRead more

    In today’s world where the security is the most important factor for electronic devices because it has a great impact on them.  A lot of the security checker is available in the world and at the same time encryption is the best among them all for the security.

    Encryption is like a guard for privacy and maintains the integrity of the information. encryption is introduced in windows and has various portions of the information encryption. Encrypted file system in window 10 is from one of these options.

    EFS (encrypted file system)

    EFS is introduced in the window in the 3.0 version of the Newest technology file system (NTFS). The file is encrypted transparently with the help of this technique and guards the data which are confidential. There are various cryptographic file systems but the EFS is the best among them all.

    EFS use for the files and folders encryption.it is quite simple to handle and has a checklist in the properties of the files. For the algorithm of the encryption, it used the window username and the password.IT provides the file system.

    EFS works with the user, not with the machine, and is a fast way for the encryption of the files.it has the incremental approach which means that it can encrypt the individual file and folders without disturbing the other files.

    But it has its owns faults as well such as the key for the file encryption is stored on the flash drive locally and it can be easily open. Because the files are not encrypted as complete drives so the information may be a leak in the temporary file system.

    Working of the EFS

    DEXS an asymmetric algorithm along with the encrypted symmetric key is used in the window 10 encrypted file system. the key has two main components one is FEK which is known as encryption key and another one is public-key technology.

    During the encryption, the encryption key is contained in the header of the encrypted file and the public key is in the user. The symmetric key has given the advantage to EFS with the time passage and it is a thousand ties quicker. The key is strongly recommended and gives access to your encrypted file in case of a mishap with the authority to your user account. The encryption is done with the file you wish to encrypt.

    When using the Windows Encrypted File System, what statement is accurate?

    Here is the question regarding the EFS of windows and the options are given below which is correct:

    1. An encrypted file moved to an unencrypted folder remains encrypted.
    2. Instead of folders files can be pin for encryption.
    3. Special software is required for EFS
    4. NTFS and FAT32 work with the EFS.

    The correct answer is option 1 when we are using the EFS of windows the encrypted file when the move to unencrypted it remains encrypted.

     

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  5. Asked: September 16, 2021In: Q & A

    What Happens If Part Of An Ftp Message Is Not Delivered To The Destination?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on September 28, 2021 at 12:40 am

      FTP (file transfer protocol) as it is suggested in the name that it is the protocol used for sending the files. It has its process of working. The protocol has its delivery process we will discuss them in this letter but I want to say that everything has its drawbacks that’s why when the messRead more

     

    FTP (file transfer protocol) as it is suggested in the name that it is the protocol used for sending the files. It has its process of working. The protocol has its delivery process we will discuss them in this letter but I want to say that everything has its drawbacks that’s why when the message is transferred by using the methods some part of the message was lost due to different circumstances.

    And people are inquisitive to know that what will happens when the FTP part were not be able to reach the destination? Let’s begin to understand the concept of the FTP and its methods and you will also be able to get the answer to the question if you can understand its working process.

    FTP

    It is the protocol of the network which is used for the file transmission between the computers linked with the TCP/IP protocol is considered as the application layer protocol in the TCP/IP model.

    The computers in the transmission area of two one is the end-user also known as the user host while the other one is the server or called the remote host. The server computer is to run FTP while the client used the services offered by the protocol .and for the transmission the host and client need to be connected to the network with proper configuration.

    FTP data transfer mode 

    The data in the FTP protocol is transferred in three different ways which are given below:

    • Stream mode: the data is transferred in continuous streaming and the FTP is free from doing other processing because all processing is transferred to TCP.
    • Block mode: FTP places the records into different blocks after then sent them to the TCP protocol.
    • Compress mode: It is the extension of the clock mode along with compression of data with run-length encoding.

    Working of FTP 

    Working of the client server-based protocol is described below:

    • There is a need for the user to log in to the server of the FTP some users may access the data without login in from the anonymous FTP.
    • When the client requests the file downloading a communication began between the client and the server.
    • With the help of the FTP end, the user can download, delete, update the files.

    FTP works with either active mode or passive modes:

    • Active mode: In this mode, the client computer begins and requests the connection after then the server also creates the connection with the client and the communication held between them.
    • Passive mode: In this, the command line channel is in the control of the server, and the information is sent to the clients of its need.

    What happens if the message fails to deliver?

    Sometimes the part of the FTP message fails to deliver to the destination. And the message might be lost due to the unreliable delivery method in that case the source host sends the message in form of a query to the destination and be able to determine the way to re-sent the lost past of the FTP message or maybe complete message re-resent by the source host.

     

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  6. Asked: September 16, 2021In: Q & A

    What Ipv4 Header Field Identifies The Upper Layer Protocol Carried In The Packet?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on September 28, 2021 at 12:40 am

    What IPv4 header field identifies the upper-layer protocol carried in the packet? An Ip stand for the internet protocol and it is responsible for communication over the networks. The Ip transfer the information in the form of frames or packets which consist of the header to the destination address.Read more

    What IPv4 header field identifies the upper-layer protocol carried in the packet?

    An Ip stand for the internet protocol and it is responsible for communication over the networks. The Ip transfer the information in the form of frames or packets which consist of the header to the destination address. The IP has two types such as:

    • IPv4.

    An ipv4 is the 32-bit address.

    • IPv6.

    An IPv6 is the 64-bit address.

    The functions of the internet protocol are the delivery of packets, addressing, and fragmenting the data into frames. The ipv4 header is the highlight of today’s discussion and it will also give the answers to the question what IPV4 header determines the upper layer protocol carried in the packet? Let’s discuss the field of the IPv4 headers.

     IPv4 header and fields 

    The header of the IPv4 has 14 fields, 13 is necessary while the one is the optional one. In the header, the field with the effective byte first are packed and the significant byte always comes in front which is the number 0.Let’s begin to evaluate a few fields of the header in the following section:

    Version:

    The field determines the internet header and the IP version. It contains four bits it means only 4 bits are used by it.

    Internet header length:

    The header of the IPv4 size is flexible due to the 14 filed which is optional. This file has stored the information of the header size of IPv4. The 4 bits in it determine the 32-bit word in the header. in the byte, the field contains 20 bytes. And the maximum size of the IHL in the byte is 60 bytes.

    Type of services

    A network service provider is given by this file of the IPv4 header.

    Total length 

    The 16-bit area defines the complete packet length in bytes, together with the header and data. The minimal length is 20 bytes while the most are 65,535 bytes. All hosts are required that allow you to rearrange datagrams of length as much as 576 bytes, however, maximum present-day hosts manage tons of large packets. Links can also additionally impose additional regulations at the packet length, wherein case datagrams are necessary to be fragmented. Fragmentation in IPv4 is accomplished in both the sending host or in routers. Rearrangement is accomplished on the destination host.

    Protocol field 

    The 8-bit number in the header of the IPv4 is the protocol filed. What kind of protocol is necessary for the packets is determined by this field? And the most important protocol is the TCP and UDP. It can identify the protocol of the upper layer in the packets or frames as well.

    Header checksum 

    Header checksum is the 16-bit field and is responsible for the error detection in the header. The checksum of the header and the field when the frames reached the router. The data field errors are handled with the help of the encapsulation protocol.

    Source and destination address 

    The source field has the IP address of the source while the destination Filed stores the IP address of the destination port.

    Conclusion 

    The IPV4 has 14 fields and one field is optional while the other ones are essential. The fields have their role and the protocol field is the field that can identify the upper-layer protocol in the header packets.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  7. Asked: September 16, 2021In: Q & A

    Which Two Statements Are True Regarding The User Exec Mode? (Choose Two.)

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on September 28, 2021 at 12:40 am

    For security purposes, Cisco software has built two different EXEC sessions which have entirely different access. Furthermore, the router of the Cisco and the switches have the IOS operating system. The prime interface for the Cisco IOS router, for their switches, is Command-line Interface. And theRead more

    For security purposes, Cisco software has built two different EXEC sessions which have entirely different access. Furthermore, the router of the Cisco and the switches have the IOS operating system. The prime interface for the Cisco IOS router, for their switches, is Command-line Interface. And the mode of the IOS which are supported by the CLI is in the following:

    • User EXEC mode.
    • Privileged EXEC mode.
    • Setup mode.
    • Global configuration mode.
    • ROM monitor mode.

    The basic purpose of determining these is to identify the user EXEC mode and from where it is the mode. We will define it in the following section. There is a question about the user EXEC mode the answer to it is also described in the article below.

    User EXEC mode:

    The EXEC Mode is also known as the User mode and it is the mode after you are connecting with the Cisco network, gives authority to the router when you are login on to it. The mode authorizes the user only the execution of the Basic commands. The router cannot be configured with help of this mode.

    By first entered into the Cisco router the pop-up shows that it is the User EXEC mode and the symbol of the EXEC mode is > after the name of the router. In the pop-up, the test is the hostname by default it is the device name but you can also change it according to your choice and after then it could be anything.

    There are few commands of this mode that you can easily find in the devices, switches, etc., few of them is given in the following section:

    Connect: The work of the mode is to open the terminal session to either switch.

    Disconnect: The purpose of this session is to close the session which is open for the remote router.

    Enable: The work of this command is to enter into the Privileged EXEC mode.

    Ping: the command sends the ping the ICMP request to the IP host of the remote which is maybe a switch or router.

    Show: It can show the configuration message or the information and it is very limited.

    Systat: The management connection is display by the Systat command.

    telnet: it can open the telnet connection with router or switch.

    Traceroute: The name indicates it can trace the route to the destination and show the connectivity.

    This set of commands is not able to do many changes in the system, and it is good in a way you can enter the mode without a password.

    Which two statements are true regarding the user EXEC mode? 

    All router commands are available.

    1. When you entered the enable command Global configuration mode can be accessed.
    2. The prompt for this mode ends with the “>” symbol.
    3. Interfaces and routing protocols can be configured.
    4. Only a few aspects of the router configuration can be viewed.

    The correct answer is options 2 and 4. The pop-up is shown with > after the router name. And few changes can be made with these commands.

     

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  8. Asked: September 16, 2021In: Q & A

    What Windows Utility Can Be Used To Find Out What Processes Are Launched At Startup?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on September 28, 2021 at 12:40 am

    Software that is specifically built to maintain, determine and configure the computer system is known as the utility software. The software also contributes to the application systems. We are learning about the window utility. The utility system helps the OS maintain the system in an optimized way.Read more

    Software that is specifically built to maintain, determine and configure the computer system is known as the utility software. The software also contributes to the application systems. We are learning about the window utility. The utility system helps the OS maintain the system in an optimized way.

    A question: Which Windows utility can be used to find out what processes are launched at startup? Is also mentioned in this topic about the window utility and after learning the topic you will be able to pick the correct answer by yourself.

    What is the window utility?

    Windows the utility is a program with the Operating System and you all know well that the operating system is used to main the whole system such as file storage, I/O devices, etc. so the importance of the window utility is quite vast. There are many types of the utilities such as:

    • system utilities.
    • storage device utilities.
    • miscellaneous utilities.
    • File management utilities.

    There are further utilities in them but in this, we will discuss the utilities which are related to your question so that you can find your answer. With the help of these utility programs, you can be able to maintain the performance, customized it according to the choice.

    Task manager Utility

    Task manager is the utility which is not so unknown cause there are some applications in the past when they are corrupt a task manager is used to close them. Not only this task manager performs various other tasks as well.

    It can determine all the running applications and the list of the running programs. By just running the program you can check easily if there is anything or a process that is not known.

    Utility of system configuration

    By clicking on the Msconfig, after that point to the start menu and search for the configuration. That’s how you can search for it. The utilities are responsible for maintaining the startup of your system.

    The whole process is given in the following section:

    • On the boot tab option, click the operating system.
    • To change the resources that are allocated to startup point to the advanced options.
    • Move to startup options.
    • Disable the programs which are not useful or disturb the startup running.

    Service on the startup is also managed with the help of it and it will also decrease the time of the startup of the computer.

    Utility of Regedit

    For the modification of the windows registry, the utility of Regedit is used. And the most important task for the modification is that keep the backup of the registry. various change in the values happens, but it might seem like harm can happen through the editing of the register. If someone wants to that process becomes close so the best example is “WaitToKillSserviceTimeout”.

    Which Windows utility can be used to find out what processes are launched at startup?

    The correct answer to the following question is given in the explanation of the topic above and also described in the following:

    1. Task Manager
    2. System Configuration
    3. Regedit.
    4. File Management Console

    The correct answer is option B the system configuration utility is used to find the process at the launch of the startup.

     

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  9. Asked: September 16, 2021In: Q & A

    Which Of The Following Statements About Linux Is Not True?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on September 28, 2021 at 12:40 am

      Linux is the operating system and is the famous operating system in the latest world. The android which is the demand in the world is based on the Linux operating system. The OS is the system software used to manage all the resources in the system. It acts as an interface between the end-userRead more

     

    Linux is the operating system and is the famous operating system in the latest world. The android which is the demand in the world is based on the Linux operating system. The OS is the system software used to manage all the resources in the system. It acts as an interface between the end-user and software.

    The question has been asked that which of the following statement is not belong to Linux. We have gathered some of the information such as: what is Linux and for what reason, it is used? By learning this I hope you can get an answer to your question.

    What is the Linux Operating system?

    Linux is an open-source kernel distribution operating system. The word open-source means that the code of Linux can be customized by the users according to their choices. The kernel is the center or the heart of the Linux operating system. Linux is alike UNIX and supports multi-tasking and the multi-user. The demand for Linux is in the server, mobile, wide computers.

    Components of Linux

    Linux operating system is based on a few components and with them, the whole system works properly and they are described below:

    Bootloader

    The bootloader’s work is to initiate the kernel of the Linux operating system. It is the software that can handle the booting process in the system.

    Kernel 

    The work of the kernel is to manage the CPU and other devices. It is the heart of the system. The process of scheduling and networking everything is controlled by Linux.

    Graphical services 

    Linux not online provides the command line interface but the graphical services as well. It manages the video and audio system along with the security.

    Desktop applications

    Desktop is the place where the user interacts with the system and in Linux a lot of desktop environments are present and they offer various applications.

    Why Linux is used?

    As we have described that Linux is the OS in the world. Still, people have questions in their mind why they should Linux? What are the benefits of using Linux? The answer is given in the following:

    • The main benefit is that it is open-source, it can be download free from the browser.
    • The code is adjustable, user can change it.
    • Linux is quite easy if someone wants to learn.
    • It has thousands of applications and all of them are free of cost.
    • Linux has the best security system. There is no such need to download any antivirus into the system. With each update, the security level becomes more and more strong.
    • Linux is stable a reliable and it can run non-stop for a long time.

    Now that you know almost everything about then you can easily pick the correct answer to the above question. The options are given below:

    1. On all the platforms of hardware, Linux can easily work.
    2. On LAN it has the main role in the back.
    3. It is easy and free of cost.
    4. The market percent of the Linux Operating system is 20 %.

    The correct answer is Option 4 the market rate of the operating system is quite high because it is on the demand.

     

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  10. Asked: September 16, 2021In: Q & A

    Which Logical Address Is Used For Delivery Of Data To A Remote Network?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on September 28, 2021 at 12:40 am

    Which logical address is used for the delivery of data to a remote network? The logical address which is used for the delivery of data to the remote network is the destination IP address. It is for the end-to-end delivery of the data to the port which is the receiver of the data. This is just a brieRead more

    Which logical address is used for the delivery of data to a remote network?

    The logical address which is used for the delivery of data to the remote network is the destination IP address. It is for the end-to-end delivery of the data to the port which is the receiver of the data.

    This is just a brief description of the destination IP address we have gathered the information from the different platforms such as what is the destination address? What is the destination IP address? How can someone find the Destination IP address? Those who want to know stay connected to the end of the topic!

    What is the destination address?

    The port or the point where the data or frames need to be reached over the network is the destination address. The destination address’s main purpose is to determine the receiver whether is suitable for the packets or maybe another port is best suited for them. The router used is to find that how to move the frames with the help of the internetwork.

    The destination address is divided into the following:

    • It might be the physical address i.e., the MAC address of the ethernet.
    • Logical address: the IP address of the IP frames.

    The destination address might be specific or general. specific the name indicates it is for some specific host or port over the network. While the general address on the network ping frames to all hosts or might be multicast to the group of receivers or host over the network.

     Destination IP address

    The destination address of the IPv4 is maybe the host, network, super network, or the default. while the destination IPv6 address is might be the host, default address, etc., the default uses the default routes which are fixed when someone does not use any other destination address.

    There is some information that determines that the following things are suitable for the destination address:

    For IPv4 

    • 0.0.0.0
    • The prefix of zero of any kind.
    • 127.0.0.1, ::1, is loopback address by default.
    • The broadcast address i.e., 255.255.255.255.

    For IPv6

    • The address is not the IPv4 mapped. IPv6 with the reserved prefix: :/96 is also not involved in the destination address.

    How to specify the destination IP address?

    To specify the IP address destination the procedure is described in the following:

    • Chose the destination Tab from the ADD event rule.
    • Choose one of the following options:
    1. Any: It is for the application of rules for all IP addresses.
    2. IP address list: it is for the specific address.
    3. Network address: It will apply the rule for the Block Ip address.
    4. Range of IP address: for the specific IP address range.

    How can someone find the destination IP address?

    Ping command is used to determine the destination IP address if someone knows the command line or the terminal emulator.

    • Type ping at the prompt, enter the spacebar, and the domain name or the server hostname needs to be typed.
    • Click on the enter tab and the destination IP address is shown on the screen of the prompt.

     

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
1 … 26 27 28 29

Sidebar

Top Members

Shailendra Yadav

Shailendra Yadav

  • 2k Questions
  • 52k Points
Level 50
Sneha Singh

Sneha Singh

  • 2k Questions
  • 41k Points
Level 40
Nilay Sharma

Nilay Sharma

  • 0 Questions
  • 33k Points
Level 30
  • Popular
  • Comments
  • Farwa Khalid

    Half Duplex Versus Full Duplex

    • 3 Comments
  • Shailendra Yadav

    Troubleshooting with TR-069 ACS for ISPs 

    • 0 Comments
  • Farwa Khalid

    What Is Ping Spoofing

    • 0 Comments
  • Farwa Khalid

    What Is Wireless Isolation?

    • 0 Comments
  • Farwa Khalid

    What Is Radio Network Controller?

    • 0 Comments
  • What is Circuit Switching - Network Classmate
    What is Circuit Switching - Network Classmate added a comment […] needs to be established. It is additive into two… November 30, 2022 at 11:36 am
  • Difference Between Router And Switch - Network Classmate
    Difference Between Router And Switch - Network Classmate added a comment […] router works in the full-duplex transmission mode. However, we… November 30, 2022 at 11:36 am
  • Communication Protocols - Network Classmate
    Communication Protocols - Network Classmate added a comment […] receiver. It is two wired protocols. Rx and Tx… November 30, 2022 at 11:35 am

  • Home
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges




Footer

Important Links

  • Home
  • Article
  • Q&A
  • Guest Post

Useful Categories

  • Basic Networking
  • Basic Security
  • CCNA R & S
  • CCNA Security
  • Download

Legal Stuff

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • User Data Policy

Social Links

  • Facebook
  • Instagram
  • Twitter
  • Telegram
  • Linkedin

Copyrights © 2023 Network Classmate™. All Rights Reserved.
Designed by LeadsNut

Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}