Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
What Tabs Found In The Windows Task Manager Dialog Box? (Choose All That Apply)?
What Tabs Found in The Windows Task Manager Dialog Box? (Choose All That Apply)? Detail PerformanceProcess Application Users. Answer: The tabs that are found in the windows task manager dialog box are the performance process and application. While the detail and users are the tabs of the task manageRead more
What Tabs Found in The Windows Task Manager Dialog Box? (Choose All That Apply)?
Answer: The tabs that are found in the windows task manager dialog box are the performance process and application. While the detail and users are the tabs of the task managers as well.
Task manager work is to manage the programs and features in the system allowing us to utilize and see the application that runs on the computer. People mostly interact with the task manager for the first time when their system starts to hang and the pc becomes slow. The task manager also works to stop or terminate the programs which are not in the use. The tabs in the task manager are listed in the following:
Process tab:
The tabs have the list of the programs in the system whether they are in running state or rest and the process runs in the back of the application or the window are also listed in this tab.
Performance tab:
The tabs work by giving the update about the performance of the hardware components such as CPU, and RAM. the tabs give the information about the model of CPU, speed, storage in the RAM, the IP address, threads, and virtualization, sockets, core, etc.
App history:
It shows the usage of CPU, and network, along with the date used by the apps running in the window. It’s a good opportunity to check the app which may be a CPU resource hog.
Startup tab:
These tabs work by displaying the programs that automatically start with the window .it also works by determining the programs that do not need to start automatically and disabling them, because it will increase the speed of the system.
User Tab:
It shows the user who is signed in the system and the processor that runs in each. It is not effective if one user is logged in but when different accounts are logged in then it is good to track the processing.
Detail tab:
It shows each process that runs in the current time.in troubleshooting, it is useful to find the data with the exact location.
Services tab:
It shows the services which are installed in the system whether they are processing or in a rest state.it is the best way to start and stop the main window services.
See lessWhat Is Used To Facilitate Hierarchical Routing In Ospf?
What is used to facilitate hierarchical routing in OSPF? Router election. Calculation of OSPF. Summarization. Multiple areas use. Answer: OSPF works to support the idea that keeps the large routing table, and extra SPF calculation. The router that is present in the area can share information relateRead more
What is used to facilitate hierarchical routing in OSPF?
Answer: OSPF works to support the idea that keeps the large routing table, and extra SPF calculation. The router that is present in the area can share information related to the link state. OSPF allows the areas that are connected to the backbone are arranged in a hierarchical form.
The hierarchical routing is used to establish the huge networks because when the network becomes large the resource requirement increases to manage the network and controls. OSPF can work with the hierarchical structure. The resource utilization in the TCP network is:
Some of the things that need to consider when OSPF operates with the hierarchical structure are:
In the OSPF the hierarchical structure must have the area such as the backbone area-area 0-to which is used the connect the non-backbone areas directly. When one interface works in the area the router act as the OSPF member. The router on the boundaries of backbone and non-backbone areas is known as ABR (area border router). The boundary in the area is the ABR as well. If the outside routes forward to OSPF AS, the router which can redistribute the routes are known as ASBR. In the manual route summary, which is performed in ABR and ASBR, the design and the mapping of the areas must be done properly.
See lessWhat Is The Binary Format For The Following Decimal Ip Address?
What is the binary format for the following decimal IP address? 131.9.202.111 Answer: The binary form of the IP address 131.9.202.111 is 10000011.00001001.11001010.01101111 The combination of the IP address and subnet mask gives the numeric value to the interface. The combination of the address is uRead more
What is the binary format for the following decimal IP address? 131.9.202.111
Answer: The binary form of the IP address 131.9.202.111 is 10000011.00001001.11001010.01101111
The combination of the IP address and subnet mask gives the numeric value to the interface. The combination of the address is used, in the absence of the subnet mask, the IP address is the dark address, and the subnet number is without an IP address. The length of the address is 32 bits, and they are divided into 4 parts which are called octets and have 8 bits in them. The octet is separated by the (.) periods. Let’s take a look at the process to convert the decimal IP address to binary.
For the IP address conversion, take 1.1.1.1 one octet is chosen at a time as
1 decimal=1 binary.
1 decimal=1 binary.
1 decimal=1 binary.
1 decimal=1 binary.
As we know the IP address is 32 bit which means 8 bits are present in one octet, that’s why make the other bits of the octets 0 such as 1.1.1.1 are equal to binary numbers:
00000001 00000001 00000001 00000001
With the help of the table listed below, it is simple to convert the 255.255.255.0
As we know 255=11111111
The binary form of the given subnet mask starts with the bottom row which is 27 =128. let’s find how many 128 in 255 :
255-128=127 and the process begins like this:
127-64=63
63 – 32 = 31
31 – 16 = 15
15 – 8 = 7
7 – 4 = 3
3 – 2 = 1
1 – 1 = 0
All the bits are used for the binary form of decimal 255 .as the last octet is 0 the binary form is 00000000. The subnet mask in binary form is:
11111111 11111111 11111111 00000000
So, the IP address and subnet mask in binary form are :
subnet mask :00000001 00000001 00000001 00000001
IP address: 11111111 11111111 11111111 00000000
See lessAn 8 Port Switch Receives A Frame On Port Number 1
An eight-port switch receives a frame on port number 1. The frame is addressed to an unknown device. What will the switch do? All the frames are sent toward port 8. The frame got lost The frames got dropped. The frames are sent out to ports 2 through eight. Answer: When the eight-port switch receivRead more
An eight-port switch receives a frame on port number 1. The frame is addressed to an unknown device. What will the switch do?
Answer: When the eight-port switch receives a frame on port number 1. The frame is addressed to an unknown device then the switch will send the frames out to the port through
The 8-port switch is the D link new series past which makes the effective use D link by saving energy, lessening the heat, and the enhanced life of the product without any compromise to the functionality. It gives the port of eight gigabits to enhance the network size and make any easy to update the network for connectivity. The switch is environmentally friendly because it has an energy-saving adapter, package recycling, etc. Some of the 8 port switching features are described in the following:
Quick and reliable networking:
The eight-port generates a quick and reliable network, due to its gigabit port that provides the fast wire connection for almost 8 systems. it has the QoS feature which makes the prioritize the traffic and the data which needs to process efficiently is delivered even if the traffic is in huge amount.it is easy to use and has the IPv6 for reliability.
Energy-saving:
The switch has different techniques that help to save energy automatically. The ports that have no link connection are shut down automatically, and make the switch to sustain the energy of the unused port by cutting their power. The power that is given to the port is also adjusted based on the length of the connected wire.
Environment friendly:
The switch is created as environment-friendly and needs the power adapter for efficient use. It is formed in a way to prevent the hazardous substances and also use the recycle package.
See lessWhich Three Application Layer Protocols Use Tcp? (Choose Three.)?
Which three application layer protocols use TCP? (Choose three.) DHCP HTTP. FTP SMTP TFTP. Answer: The protocol that uses the TCP are FTP, SMTP, and HTTP. TCP gives reliability in the data transfers which is useful for some protocols. The protocol can handle the data loss because they have no real cRead more
Which three application layer protocols use TCP? (Choose three.)
Answer: The protocol that uses the TCP are FTP, SMTP, and HTTP. TCP gives reliability in the data transfers which is useful for some protocols. The protocol can handle the data loss because they have no real communication and also lessen the protocol overhead.
SMTP:
An application layer protocol SMTP (simple mail transfers protocol) come in handy when a client sends an email and he/she opens the SMTP server which is connected with the TCP and sends the email.it is always-on listening mode as soon the client initiates the request to send the email, the protocol establishes the connection on port 25, and when the connection is established then the client can be able to mail. SMTP has two forms:
FTP:
However, As the name suggested FTP (file transfers protocol) is used to transmit the file between systems through the help of a TCP connection. in the TCP/IP FTP is the application layer protocol. In the file transmission, the user is the localhost, and the other system in FTP is the remote host and it is servers. For the file transmission connection with the internet is essential. The server offers the FTP services while the client has the software to avail of those services.
Most of the files are transmitted to HTTP protocol, but this protocol is also common to transfer files for some applications, like the bank services. It can also download the apps from the browser.
HTTP:
HTTP is the application layer protocol. the communication between the client and the server is due to the HTTP request and HTTP responses.it is a stateless protocol and use for many reasons and also use extension for error codes, headers, etc.
HTTP in the TCP/IP protocols used to transfer files like images, HTTP files, etc on www (world wide web). the default port for it is 80 and other ports are also used. HTTP specified how the request is sent toward the server and then the reply from the server of the request is also provided by HTTP.
See lessWhat Three Characteristics Distinguish Tcp From Udp
What three characteristics distinguish TCP from UDP? Answer: The features that distinguish between the TCP and UDP are: TCP is connection-oriented. It has flow control. The header size of the TCP is 20 bytes. TCP: TCP work by defining which and how the specified PCs have the connection with the inteRead more
What three characteristics distinguish TCP from UDP?
Answer: The features that distinguish between the TCP and UDP are:
TCP:
TCP work by defining which and how the specified PCs have the connection with the internet and the transmission of the data among them. Virtualization is also possible with the TCP when more than two computer wants to connect.
The transmission control protocol is the standard that is created to provide reliable and end-to-end transmission over the network which is not reliable. Some of the TCP features are listed in the following:
UDP:
A user datagram protocol is for the transmission of the broadcast and multicast transmission.it works the same ans the TCP but it has no error detection ability rather than it throws them, the back-and-forth transmission, etc. The characteristics of the UDP are listed in the following:
Some of the differences between the TCP and UDP are listed in the following table:
UDP
What Process Sends Ones And Zeroes Across Network Cables?
What process sends ones and zeroes across network cables? Modulation Switching Crosstalk Broadcasting. Answer: Modulation is the process that sends the one and zeros across the network. The data which is sent is the audio, images, etc. What do you know about modulation? Modulation transfers the datRead more
What process sends ones and zeroes across network cables?
Answer: Modulation is the process that sends the one and zeros across the network. The data which is sent is the audio, images, etc.
What do you know about modulation?
Modulation transfers the data such as the audio, video, and images that are added to the optical carrier and then move toward the telecommunication. Modulation is the process that transfers the digital data to the electrical signals and sends it toward the receiver where the demodulation process occurs that transfers the electrical signals to the digital signals.
The technology that requires the data transmission in the form of the electrical signals is the one that uses the process of the modulation .in the data transmission is the backbone because the electrical signals are used as the carriers with the help of it. The modulation process occurs by the modification in the carrier which is either the amplitude, frequency, or phase.
Modulation work by adding the data on the carrier, by the disturbance in the amplitude, frequency, or phase. On the EM signals, the modulation process is applied like the radio waves, lasers, etc. The DC modulation is also applicable and acts as the degenerate carrier along with fixed amplitude and frequency 0 HZ. The process of modulation is applied to the AC with a low frequency approx. 50- 60HZ. There are types of the modulation that are:
AM (amplitude modulation): The carrier amplitude is disturbed.
FM (frequency modulation): The carrier frequency is disturbed.
PM (phase modulation): The carrier phase is disturbed.
Polar modulation: The optical carrier angle is rotated to reflect the data.
The modem is the one where the modulation process is implemented in it the data is modulated and moved toward the telephone lines and on the receiver end, they are demodulated to get the message.
See lessWhat Is The Output Of The Following Code Segment? N = 1; While (N <= 5) Cout << N << ' '; N++;?
What Is the Output of The Following Code Segment? N = 1; While (N <= 5) Cout << N << ' '; N++; 3 4 5 7 2 7 9 4 1 9 0 3 5 6 9 4 1 1 …. ans so on. Answer: The correct answer to the following code when it is executed is option 5. The purpose to use loops is to repeat the code. Such as iRead more
What Is the Output of The Following Code Segment? N = 1; While (N <= 5) Cout << N << ‘ ‘; N++;
Answer: The correct answer to the following code when it is executed is option 5.
The purpose to use loops is to repeat the code. Such as if you want to display the message 10 times then instead to write it over and over you can take help from the loops. Loops are efficient and also enhance the program efficient. Three types of loops exist which are listed below:
While loop:
While loop work by determining the given condition, and it is true the while loop body code is executed. The condition was checked again till it was false, after that the loop terminated.
The while loop syntax is:
While (condition) {
Loop body
}
do While:
It is the extension of the while loop and the major difference is that in it the loop is executed and then the condition checked, which is the opposite of the while loop. The syntax of the do-while loop is :
Do {
Loop body
}
While (condition);
So do while work in the following way:
For loop:
For loop is considered as the repetitive loop which permits you to write it when you need to execute it for a specific time. The syntax of the for loop is:
For (i=; i<= condition; i++) {
Body of loop
}
It works in the following order:
What Are Two Characteristics Of Ram On A Cisco Device?
What are two characteristics of RAM on a Cisco device? The nonvolatile memory is created as RAM. An active running configuration on the devices is contained in RAM. In the process of the power cycle, the RAM data is lost. It is considered as the Cisco switching element but not for the Cisco router.Read more
What are two characteristics of RAM on a Cisco device?
Answer: The data which assists in the operation of the network is stored by the RAM. An active running configuration on the devices is contained in RAM. In the process of the power cycle, the RAM data is lost because RAM is the volatile memory. The versions of the IOS are in the flash memory which in return makes a copy of it in the RAM when the system is turned off. Unlike RAM, flash memory is nonvolatile because the data is not lost when the system is shut down.
Cisco OS runs on the Cisco router switches, and the goal of it is to enable communication among the nodes. There is total of four types of memory in the Cisco devices which are listed below:
RAM:
RAM is the system volatile memory that handles the active task running on the system. it is an essential component and any kind of program, or file is useless without it. RAM is the fastest and most temporary storage which is used by the computer even now.
ROM:
Unlike RAM, it is the permanent storage of the data on PCs and other devices.it is tough to change or modify only the manufacturers can do it. Some of the ROM types can be rewritten but at a slow speed.
Flash memory:
Nonvolatile memory is programmed in a specific place known as the block. The content of the flash memory is erasable and the data is retained even if the power supply is not present.it is costly and slow.
NVRAM:
NVRAM is the extension of the RAM and contains the data during the power down.it uses the tiny 24-pin DIP integrated chips whose work is to obtain the power for the working from the CMOS battery which exists on the motherboard.
See lessWhen Would You Most Likely Not Choose To Use A Leased Line Connection?
When would you most likely NOT choose to use a leased line connection? The leased line connection is not used for the critical application mission. When there is a need for the backups by the non-dedicated links. During the 24-hour permission of the quality access. During the need of fast upstream aRead more
When would you most likely NOT choose to use a leased line connection?
Answer: You would not most likely not choose a leased line connection when there is a need for the backups by the non-dedicated links.
The leased lines are useful for the business to connect more than two locations. The leased line is developed to connect the location of the telecommunications.it is not dedicated but a circuit among two points, stay active for 24 hours, and have the subscription fee.it can cover the short geographical area as well the long.it contains an open circuit, unlike the telephone system that can use the same line for conversations with the switching process.
Businesses rented the leased line often because the different branches need to communicate. The leased line has the guarantee for the bandwidth for the traffic in the locations, such as the leased line type T1 are common and present the same rate as the symmetric DSL.
People can also rent the leased lines for the fastest internet access, but due to their cost, most of them are not able to afford, at the home greater bandwidth as compared to the dial-up phones, in which the residential DSL, cable internet services.
Pros and cons of the leased line connection:
The pros and cons of the leased lines are described in the following:
Pros:
Cons: