Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In
Continue with Google
or use


Have an account? Sign In Now

Sign In

Continue with Google
or use

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Network Classmate Logo Network Classmate Logo
Sign InSign Up

Network Classmate

Network Classmate Navigation

  • Home
  • Article
  • Q&A
  • Guest Post
Search
Ask A Question

Mobile menu

Close
  • Home
  • Feed
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges

Nilay Sharma

Level 30
Ask Nilay Sharma
481 Visits
0 Followers
0 Questions
Home/ Nilay Sharma/Answers
  • About
  • Questions
  • Polls
  • Answers
  • Best Answers
  • Asked Questions
  • Followed
  • Favorites
  • Groups
  • Posts
  • Comments
  • Followers Questions
  • Followers Answers
  • Followers Posts
  • Followers Comments
  1. Asked: December 16, 2022In: Q & A

    How To Remove Macros In Word?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 17, 2022 at 8:16 pm

    1. Open the Microsoft Word file with the macros. 2. Click the “Tools” or “Developer” tab, depending on if you’re using an older or newer version of Microsoft Word. 3. Select “Macros” from the menu and then click “Security.” 4. Select “High” or “Very High” in the Security Level box. This will disableRead more

    1. Open the Microsoft Word file with the macros.

    2. Click the “Tools” or “Developer” tab, depending on if you’re using an older or newer version of Microsoft Word.

    3. Select “Macros” from the menu and then click “Security.”

    4. Select “High” or “Very High” in the Security Level box. This will disable any macros in the document.

    5. Click “Disable all macros with notification” or “Disable all macros without notification.” This will disable all macros in the document.

    6. Click “OK” to save the changes, and then save and close the document.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  2. Asked: December 16, 2022In: Q & A

    How To Mute Your Computer Mic?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 17, 2022 at 8:15 pm

    1. Right-click on the volume/speaker icon in your taskbar at the bottom right corner of your screen. 2. Select the "Recording devices" option. 3. Right click on the microphone you want to mute and select "Mute." 4. The microphone should now be muted.

    1. Right–click on the volume/speaker icon in your taskbar at the bottom right corner of your screen.

    2. Select the “Recording devices“ option.

    3. Right click on the microphone you want to mute and select “Mute.”

    4. The microphone should now be muted.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  3. Asked: December 16, 2022In: Q & A

    What Is Centos Installing?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 17, 2022 at 8:15 pm

    CentOS is a Linux distribution based on Red Hat Enterprise Linux (RHEL), which is a commercial operating system. CentOS is often used as an alternative to RHEL due to its lower cost and open source licensing. CentOS can be used to serve web pages, host databases, run mail servers, and more. AdditionRead more

    CentOS is a Linux distribution based on Red Hat Enterprise Linux (RHEL), which is a commercial operating system. CentOS is often used as an alternative to RHEL due to its lower cost and open source licensing. CentOS can be used to serve web pages, host databases, run mail servers, and more. Additionally, CentOS provides security updates and bug fixes.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  4. Asked: December 16, 2022In: Q & A

    How To Check Redhat Kernel Version?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 17, 2022 at 8:15 pm

    You can check the Redhat Linux kernel version by running the command "uname –r" on the terminal. The output of this command will display the exact version of the Redhat Linux kernel that is currently running on your system. You can also check the version of the kernel by opening the "RedHat ReleaseRead more

    You can check the Redhat Linux kernel version by running the command “uname –r“ on the terminal. The output of this command will display the exact version of the Redhat Linux kernel that is currently running on your system. You can also check the version of the kernel by opening the “RedHat Release Notes“ window and looking at the version in the first few lines of the text.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  5. Asked: December 16, 2022In: Q & A

    How To Boot Ubuntu From Usb Drive?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 17, 2022 at 8:14 pm

    1. Download the appropriate version of Ubuntu onto your computer. 2. Insert your USB drive and back up any data on it, if necessary. 3. Use a disk imaging program, such as Universal USB Installer to create a bootable USB drive from the downloaded Ubuntu ISO file. 4. Reboot the computer and enter youRead more

    1. Download the appropriate version of Ubuntu onto your computer.

    2. Insert your USB drive and back up any data on it, if necessary.

    3. Use a disk imaging program, such as Universal USB Installer to create a bootable USB drive from the downloaded Ubuntu ISO file.

    4. Reboot the computer and enter your BIOS menu by pressing the appropriate key (usually F2, F10, Del or Esc).

    5. Change the boot order so that USB devices are listed first.

    6. Save the changes you have made and exit the BIOS.

    7. Your computer should now boot from the USB drive.

    Follow the onscreen instructions to install Ubuntu.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  6. Asked: December 16, 2022In: Q & A

    How To Find Your Own Email Password?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 17, 2022 at 8:14 pm

    If you’ve forgotten your email password, the first step is to try resetting it. Most email providers allow users to reset their passwords via an online form or a link sent via email. If you cannot remember the details necessary to reset your password, you can usually contact your email provider direRead more

    If you’ve forgotten your email password, the first step is to try resetting it. Most email providers allow users to reset their passwords via an online form or a link sent via email. If you cannot remember the details necessary to reset your password, you can usually contact your email provider directly for assistance.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  7. Asked: December 16, 2022In: Q & A

    How To Use Wireshark Step By Step?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 17, 2022 at 8:13 pm

    Step One: Install Wireshark. Download and install Wireshark on your computer. This program is available for Windows, Mac OS X, and Linux computers. Step Two: Choose a Network Interface. Once Wireshark is installed, open the program. You'll be presented with a list of network interfaces (or "adapterRead more

    Step One:

    Install Wireshark. Download and install Wireshark on your computer. This program is available for Windows, Mac OS X, and Linux computers.

    Step Two:

    Choose a Network Interface. Once Wireshark is installed, open the program. You‘ll be presented with a list of network interfaces (or “adapter cards“ or “network cards“) that are connected to your computer. Select the one you want to monitor.

    Step Three:

    Start Capturing Traffic. Once you‘ve selected the network interface, click on the “Start“ button to begin capturing traffic. Wireshark will start monitoring all of the data passing through the network.

    Step Four:

    Analyze the Traffic. Now you can begin analyzing the traffic flowing in and out of your machine. Wireshark has a lot of features to help you filter out the data you don‘t need and highlight the information you do. It also allows you to dissect a packet to see what types of data it contains.

    Step Five:

    Save Results. When you‘re done analyzing the traffic, you can save the results by clicking on the “Save As“ button. This will allow you to save the traffic data to a file for later viewing.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  8. Asked: December 16, 2022In: Q & A

    What Is The Result Of Anding 255 And 15?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 17, 2022 at 8:12 pm

    The result of ANDing 255 and 15 is 15.

    The result of ANDing 255 and 15 is 15.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  9. Asked: December 16, 2022In: Q & A

    What Do Rfc 349 And Rfc 1700 Have In Common?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 17, 2022 at 8:12 pm

    RFC 349 and RFC 1700 both describe the Internet Assigned Numbers Authority (IANA). RFC 349 defines guidelines for IANA activities and was published in 1973, while RFC 1700 defines the initial values for many of the parameters that IANA maintains and was published in 1994.

    RFC 349 and RFC 1700 both describe the Internet Assigned Numbers Authority (IANA). RFC 349 defines guidelines for IANA activities and was published in 1973, while RFC 1700 defines the initial values for many of the parameters that IANA maintains and was published in 1994.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  10. Asked: December 17, 2022In: Q & A

    What Is Port Scanner Online?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 17, 2022 at 6:51 pm

    A port scanner online is a tool or website that can be used to scan a given IP address or domain for open ports. It helps determine which ports may be exposed to the internet, and what services are running on those ports. This can help detect potential security issues, as well as identify possible mRead more

    A port scanner online is a tool or website that can be used to scan a given IP address or domain for open ports. It helps determine which ports may be exposed to the internet, and what services are running on those ports. This can help detect potential security issues, as well as identify possible malicious activity.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
1 … 227 228 229 230 231 … 499

Sidebar

Top Members

Shailendra Yadav

Shailendra Yadav

  • 2k Questions
  • 52k Points
Level 50
Sneha Singh

Sneha Singh

  • 2k Questions
  • 41k Points
Level 40
Nilay Sharma

Nilay Sharma

  • 0 Questions
  • 33k Points
Level 30
  • Popular
  • Comments
  • Farwa Khalid

    Half Duplex Versus Full Duplex

    • 3 Comments
  • Farwa Khalid

    What Is Wireless Isolation?

    • 0 Comments
  • Farwa Khalid

    What Is Ping Spoofing

    • 0 Comments
  • Farwa Khalid

    What Is Radio Network Controller?

    • 0 Comments
  • Farwa Khalid

    What Is A Typical Symptom Of A CMOS Battery Failure?

    • 0 Comments
  • What is Circuit Switching - Network Classmate
    What is Circuit Switching - Network Classmate added a comment […] needs to be established. It is additive into two… November 30, 2022 at 11:36 am
  • Difference Between Router And Switch - Network Classmate
    Difference Between Router And Switch - Network Classmate added a comment […] router works in the full-duplex transmission mode. However, we… November 30, 2022 at 11:36 am
  • Communication Protocols - Network Classmate
    Communication Protocols - Network Classmate added a comment […] receiver. It is two wired protocols. Rx and Tx… November 30, 2022 at 11:35 am

  • Home
  • Groups page
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Communities
  • Polls
  • Tags
  • Badges




Footer

Important Links

  • Home
  • Article
  • Q&A
  • Guest Post

Useful Categories

  • Basic Networking
  • Basic Security
  • CCNA R & S
  • CCNA Security
  • Download

Legal Stuff

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • User Data Policy

Social Links

  • Facebook
  • Instagram
  • Twitter
  • Telegram
  • Linkedin

Copyrights © 2023 Network Classmate™. All Rights Reserved.
Designed by LeadsNut