Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
What Is The Difference Between Process And Protocol?
What Is the Difference Between Process and Protocol? Answer: The process is the program instance in the system. The process is closely related to the task of the operating system. In UNIX the process began with the start of the program. Protocols are the developed rules that define data transfer betRead more
What Is the Difference Between Process and Protocol?
Answer: The process is the program instance in the system. The process is closely related to the task of the operating system. In UNIX the process began with the start of the program. Protocols are the developed rules that define data transfer between connected devices in a network and allow them to communicate even if their designs, and models are different.
Process:
The process is the program instance that runs on PCs or computers. It can be a simple background task like the spelling mistakes checker or the event handler in an application like chrome or MS word. The process is made of one or larger threads combination. The OS has a various task that runs in the system that’s why apart from the actual program it can have more process in the system
Similar to the tasks, the process in the programs is correlated with the specified set of data to keep the track of it. If multiple users are using the application it has at least one process for every user at the execution time. The process can also start the subprocess known as the child process and the process is referred to as the parent. The child’s process is identical to its parent and shares the resources, but if the parent is gone, it will terminate. Along with the different techniques of the Interprocess communication (IPC) the process is allocated to share the information or make the operation synchronized.
Protocol:
The protocol determines how data is transferred between devices on the same network. The protocols are the same as the common language of the system. The network system uses different physical devices and software, but the job of the protocol is to allow them to communicate with each other. The network protocol is the communication that is enabled with the world and has a role in advanced digital communication.
Network protocols allowed the devices to have the interaction due to the preestablished rules that are built into the device’s software and hardware. Without the protocols of the LAN, WAN is not able to perform its function.
See lessWhat Happens When You Block a Phone Number?
What Happens When You Block a Phone Number? Answer: When the phone number is blocked the call will go straight to the voicemail. Every time the block number call will go to voicemail like your phone is turned off. That ‘is how they know that their number is blocked, their call will never show on youRead more
What Happens When You Block a Phone Number?
Answer: When the phone number is blocked the call will go straight to the voicemail. Every time the block number call will go to voicemail like your phone is turned off. That ‘is how they know that their number is blocked, their call will never show on your phone.
The androids are the world’s gateway. With the help of it, you can be in touch with everyone on a regular basis despite your location. Apart from all the connections with your known people, there are some people whose connection is not needed. Android has the ability to block the number you don’t recognize so that it can’t send calls or messages.
The scammers might be a bully or frauds and it’s very well if their number is blocked instantly to prevent a big loss. In this topic let’s further discuss what happens when you block a number, especially on Android.
Number Block on Android:
Most people have the confusion that there is a chance a person whose number is blocked receives the notification on their cell phone. Google is highly private and also keeps the user privacy its priority and that’s why the other person will never know that they are blocked.
In a simple way on an android when the number is blocked. then the caller will never contact you. The call will never show up on your phone and will go to voicemail. Despite the caller being able to listen to the phone ringing only before your phone is diverted to voicemails. The text message of the caller will never send. The notification for a message sent along with the timestamp will never appear on their screen. And you will never get their messages.
Now when you try to contact the number you have blocked it whole different situation. When you try to contact the number, you have blocked the process on the android is that you can call them, message them just like with other numbers. The caller will receive the notification and calls messages, but they cant be able to contact you. The block is one way it does not go both ways.
See lessWhat Does Rtt Mean On An Iphone?
What Does RTT Mean on an iPhone? Answer: If someone has a disability and can’t able to listen or spoke then communication with phones happens through teletype (TTY) or the RTT (real-time text), which work by transmitting the text as someone type and the recipient have permission to read it right awaRead more
What Does RTT Mean on an iPhone?
Answer: If someone has a disability and can’t able to listen or spoke then communication with phones happens through teletype (TTY) or the RTT (real-time text), which work by transmitting the text as someone type and the recipient have permission to read it right away.
RTT is the protocol that has the feature to translate the audio into the text message. iPhone has a built-in RTT there is no need for an external device. When you enable RTT, by default the protocol runs whenever needed. iPhone supports the TTY, which connects the iPhone to the outer TTY with its adapter. The process to set the RTT and TTY is described below:
When the RTT is active, an icon appears at the top of the screen indicating that it is fully set.
How to type text on RTT or TTY call?
The steps are listed below:
iPhone connection with the external TTY devices:
If the hardware TTY is ON then with the help of the iPhone TTY adapter connect it with the phone. The calls default to the TTY of hardware if the TTY of software is turned ON. The documented form is listed in the following:
What Is Set Up Secure And Erase?
What Is Set Up Secure and Erase? Answer: The set UP secure and erase is established with the PIN code, passwords, etc. First, you need to lock the screen. If you lost your phone and want someone to return it to you the set up secure and erase can add the message or number on your lock screen. It wilRead more
What Is Set Up Secure and Erase?
Answer: The set UP secure and erase is established with the PIN code, passwords, etc. First, you need to lock the screen. If you lost your phone and want someone to return it to you the set up secure and erase can add the message or number on your lock screen. It will delete permanently delete the device data but stay on the SD cards.
How to find the lock and erase on android?
In an Android phone, if somebody lost it, they can find, lock or even erase the data on it. When the Google account is logged in to the phone, find my device is auto on. To lock erase or lock the phone the process is described below:
How to remotely find the lock, and erase it?
What To Do With a Raspberry Pi?
What can you do with a Raspberry Pi? Answer: The Raspberry Pi is used to know codes and those who already know how to code it use it in electronics coding for physical projects.it helps you to develop home automatic projects that are quite in demand in an open-source community because the control syRead more
What can you do with a Raspberry Pi?
Answer: The Raspberry Pi is used to know codes and those who already know how to code it use it in electronics coding for physical projects.it helps you to develop home automatic projects that are quite in demand in an open-source community because the control system is in your hand unlike using the exclusive closed system.
Raspberry Pi is a single-board system that has its series developed by the Raspberry Pi Foundation, their purpose is to create awareness of computing and have easy access to computer education. In 2012 it was launched and after then different variants and series came. The first-ever Raspberry is a single-core 700MHZ CPU and 256MB RAM, while the latest Pi is having 1.5GHZ quad-core CPU with 4GB RAM.
People use it to develop programming skills and create projects for hardware, home automation is the most common use of it. At present, the industrial application is built with the use of Raspberry Pi.as compare to the other PC the Pi is cheap and runs on Linux, gives the GPIO (general purpose input/output) pins, give the feature to handle the electronics for physical objects, and role in IoT.
The Raspberry puts control of digital and computer operations in the hands of one person hands and this happens with cheaply priced, more capable systems that are used to learn programming while having fun and solving problems.it is open-source that educates people about making digital things and trains people so that they are able to educate other people about computing. The things that can be done with Raspberry Pi are listed in the following:
HTPC media streaming:
Raspberry Pi provides high power as the media-streaming box rather than using the streaming-centric sticks. the Raspberry HTPC work is to show the HD video on big screens.
Provide Dumb Tv smarts:
if you want to make your Dumb Tv a smart one such as it contains web browsers and different application then the Raspberry Pi do it at a cheaper price.
Wireless printers:
Printers are not common as they used to be, Raspberry Pi can change the simple USB printer to a wireless networked one that each device can connect with it. For the connection, Just the power source of the devices and USB port is required
See lessWhat Does Broadband Mean On a Router?
What Does Broadband Mean on a Router? Answer: Broadband is an internet connection from houses to the whole world by transmitting and receiving data. Broadband speed is about 25Mbps for both downloading and uploading. The internet connection by it is provided with different sources such as fiber optiRead more
What Does Broadband Mean on a Router?
Answer: Broadband is an internet connection from houses to the whole world by transmitting and receiving data. Broadband speed is about 25Mbps for both downloading and uploading. The internet connection by it is provided with different sources such as fiber optics, DSL, WIFI, satellites, etc. The broadband router provides the connection through ISP (internet service provider).
A networking device that provides an internet connection through an internet service provider (ISP). The ISP’s job is to configure and deliver the broadband router to your end-user. It is also called a broadband modem, DSL modem, or ADSL. The connection by the broadband router might be:
In a single device, the broadband router confines the functionalities of the DHCP (dynamic host configuration protocol), switches, and firewalls. Apart from the local area network, Wifi connection and built-in functionality for security. The main characteristics of the broadband router are described below:
However different types of internet provider companies established in the world and the selection from one of them is a task. There are some points that help the user in their best possible selection:
The broadband speed is most important when the internet connection is established, because HD videos, uploading, and downloading need large bandwidth. The average speed that might fulfill the needs starts from 100 Mbps and more. For music, scrolling and video calls at least 25Mbps is enough. The broadband speed is the most important for the internet because the different users are connected to the internet and they all are doing different activities and they want their work done without any hurdles.
See lessWhat Does Too Many Redirects Mean?
What Does Too Many Redirects Mean? Answer: An error that shows too may redirect determine that the browser went to the indefinite loop for redirection. An indefinite loop means when the browser visits the first site, it moves to the second URL and moves back to the first site and is stuck in it. TheRead more
What Does Too Many Redirects Mean?
Answer: An error that shows too may redirect determine that the browser went to the indefinite loop for redirection. An indefinite loop means when the browser visits the first site, it moves to the second URL and moves back to the first site and is stuck in it.
The error of too many redirects is displayed when the browser can’t be able to develop the connection between the first page and the destinated page. In chrome, the error shows like “the page isn’t responding. Clean the cookies. ERR _TOO _MANY _REDIRECTS. The following site redirects too many times. On Firefox the message will display like this: the page is not working properly. The server redirects the request in an indefinite loop. The problem occurs by ignoring or all the cookies. ERR _TOO _MANY _REDIRECTS.
The redirects can e the SEO methods which allow the user to visit the pages through change URLs. For example, your website is popular but for some reason, the content can be changed and you want the user to visit another site with advanced features. You can be able to ask the user to visit your other site or type a different URL in a browser.
The redirection helps the people in a way they can access the new site automatically when they open the old URL.no matter what URL they are using in the address bar they will go to the destinated page which enhances the user experience.
Moreover, due to the misconfiguration, the browser can’t able to connect and redirect the user to some other destination that is not your site. When the browser is confused to use the URLs, it stopped the searching to avoid overloading and the user gets the message on their end for error. Sometimes the browser went to the indefinite loop for redirection and the old and new URLs consistently redirected to each other. When the system gives up it shows the error message for redirection. To solve the problem, you need to follow a few steps which are:
What Is a Common Source Of Connection Problems With Ethernets?
What is a common source of connection problems with ethernets? DNS (Domain name system). Client-server communication. An autosensing mechanism. Token rings. Answer: The main source of the ethernet connection problem is the autosensing mechanism which can find the network automatically. Network adapRead more
What is a common source of connection problems with ethernets?
Answer: The main source of the ethernet connection problem is the autosensing mechanism which can find the network automatically.
Network adapter has the autosense feature and the name suggests that its work is to detect the present local network speed and also change the setting according to choice.it is mostly present in the Ethernet, Fast Ethernet hubs, and NIC (network interface card).
The autosensing is often used in the network adapter which assists with the interface. In a few systems, the autosensing is customized that configure and make the priorities for the signals according to the need for communication. The network card autosensing changes the setting according to the network and also has the autoconfiguration feature.
In the network adapter, the autosense is created by a national semiconductor with the help of the NWay protocol of telecommunication.it is present in the devices such as switches, a routers which are allowed to use any kind of network speed. The Nway technology work by determining and configuring the best and fast network speed and the device mode with the brief control of the wires and modifying the settings. The cable used by the NWay is 10BASE-T,10Base-T duplex, 100 Base-T, and the duplex of 100Base-TX.
During the first-time connection of the Ethernet 10/100 card, the speed is adjusted automatically. The default speed is 100 which is not supported by the network. The hubs can also set the speed by autosensing according to the need. Most ethernet devices use autosense on port-to-port.
The current is sensed by an autosensing mechanism in the following ways:
What Is a Block Size In Subnetting?
What Is a Block Size Subnetting? Answer: The network uses the IP address set which is called a block. The IP addresses are the power of two. The address amount in the block is known as the block size. The power of two of the block size means that it is created with the two powers of the integers. SuRead more
What Is a Block Size Subnetting?
Answer: The network uses the IP address set which is called a block. The IP addresses are the power of two. The address amount in the block is known as the block size.
The power of two of the block size means that it is created with the two powers of the integers. Subnet work is to steal the bits of the Host address. Subnetting needs to separate the network into two subnetworks. The host file of the network subnet is the outcome of the subnetting, and two IP addresses are present to determine the subnet and broadcast subnet address.
To clarify the concept of the block size in subnetting, assume 256 addresses are associated with the network. Two addresses are used for the following process:
The addresses are divided into 8 subnets along with 32 addresses in the subnet. The subnets have one common factor both have two addresses fixed for the subnet and the broadcast address. The block size is the work of mathematics. Along with the subnet mask contain the IP address for block size. The ranges in the individual subnet mask are used to find the block size.
Most computer programs find the block size for users and in today’s world, the program is present in web base and also application form. Most of the octets are divided into an IP address to find block size, such as the IP address 172.0.1.0 and 172.0.0.1 are different and the user must not mix them. to check the block size the user must need to know what is subnetting? It contains the boundaries that are created by two to the integer power. Some of the rules must follow to determine the block size:
What Is Ip And Mac Binding?
What Is Ip and Mac Binding? Answer: A server when running on a particular machine needs to look at the client connection and the administrator is responsible to select the IP address that is listed by the server process. The particular IP address selection is called the binding. The MAC binding is tRead more
What Is Ip and Mac Binding?
Answer: A server when running on a particular machine needs to look at the client connection and the administrator is responsible to select the IP address that is listed by the server process. The particular IP address selection is called the binding. The MAC binding is the process to bind the MAC and IP address which ensures that the specified IP address request is only sent toward the particular MAC address computer. The consequences of it are that if the IP address and MAC address are disturbed then there is no access to the internet.
What do you know about IP-MAC binding?
The IP-MAC binding is the feature that has the support in a system. The MAC-post binding and IP-MAC-port are to manage the security of the network. Let’s check the process to determine the IP-MAC binding configuration:
Add in the IP-MAC binding:
The process to add IP-MAC binding is listed in the following:
How to obtain dynamic IP-MAC binding?
The IP-MAC binding in the system is present through:
The steps for the configuration are listed in the following:
The configuration of the ARP scan took place in the following steps.