Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In
Continue with Google
or use


Have an account? Sign In Now

Sign In

Continue with Google
or use

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Network Classmate Logo Network Classmate Logo
Sign InSign Up

Network Classmate

Network Classmate Navigation

  • Home
  • Article
  • Q&A
  • Guest Post
Search
Ask A Question

Mobile menu

Close
  • Home
  • Feed
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges

Nilay Sharma

Level 30
Ask Nilay Sharma
481 Visits
0 Followers
0 Questions
Home/ Nilay Sharma/Answers
  • About
  • Questions
  • Polls
  • Answers
  • Best Answers
  • Asked Questions
  • Followed
  • Favorites
  • Groups
  • Posts
  • Comments
  • Followers Questions
  • Followers Answers
  • Followers Posts
  • Followers Comments
  1. Asked: December 16, 2022In: Q & A

    How To Disable a Macro In Excel?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 17, 2022 at 1:03 pm

    To disable a macro in Excel, you first need to open the Visual Basic Editor (VBE) by pressing Alt + F11. In the VBE, locate the macro you want to disable and right-click it. Select the ‘Disable macro' option from the dropdown menu. Save the project and close the VBE. The macro will now be disabled wRead more

    To disable a macro in Excel, you first need to open the Visual Basic Editor (VBE) by pressing Alt + F11. In the VBE, locate the macro you want to disable and right–click it. Select the ‘Disable macro‘ option from the dropdown menu. Save the project and close the VBE. The macro will now be disabled when the workbook is opened.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  2. Asked: December 16, 2022In: Q & A

    What Three Application Layer Protocols Are Part Of The Tcp Ip Protocol Suite?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 17, 2022 at 1:02 pm

    The three application layer protocols that are part of the TCP/IP protocol suite are: Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), and Simple Mail Transfer Protocol (SMTP).

    The three application layer protocols that are part of the TCP/IP protocol suite are: Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), and Simple Mail Transfer Protocol (SMTP).

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  3. Asked: December 16, 2022In: Q & A

    What Are The 3 Types Of Hackers?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 17, 2022 at 1:02 pm

    1. White Hat Hackers: White hat hackers are ethical hackers who specialize in penetration testing and other testing methodologies to ensure the security of an organization’s information systems. 2. Black Hat Hackers: Black hat hackers are malicious hackers who use their expertise for personal gain oRead more

    1. White Hat Hackers: White hat hackers are ethical hackers who specialize in penetration testing and other testing methodologies to ensure the security of an organization’s information systems.

    2. Black Hat Hackers: Black hat hackers are malicious hackers who use their expertise for personal gain or to cause destruction. They are often involved in cybercrime and other computer related crimes.

    3. Gray Hat Hackers: Gray hat hackers are a mix between white hat and black hat hackers. They use their skillset to find weaknesses in systems and notify the organization prior to attempting to exploit them, usually in exchange for some form of reward.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  4. Asked: December 16, 2022In: Q & A

    What Is Ssh Using Rsa Key?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 17, 2022 at 1:01 pm

    SSH (Secure Shell) using RSA key is a secure way of logging into a remote machine over an unsecured network. It uses a public/private key pair to authenticate the user and encrypts the data during the session using symmetric encryption. An RSA key is generated based on a mathematical algorithm thatRead more

    SSH (Secure Shell) using RSA key is a secure way of logging into a remote machine over an unsecured network. It uses a public/private key pair to authenticate the user and encrypts the data during the session using symmetric encryption. An RSA key is generated based on a mathematical algorithm that produces a public and private key pair. The public key can be shared freely, while the private key must be kept confidential. Once the connection is established, the server sends its public key to the client, which verifies it against a list of known hosts. When a match is found, the client uses the public key to generate an encryption key that encrypts information transmitted between the two systems.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  5. Asked: December 16, 2022In: Q & A

    What Is Galaxy A71 5g Specs?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 17, 2022 at 1:01 pm

    The Samsung Galaxy A71 5G is a smartphone released in 2020. It features a 6.7-inch FHD+ Super AMOLED Infinity-O display with a resolution of 2400 x 1080 and an aspect ratio of 20:9. The device is powered by an octa-core Qualcomm Snapdragon 765G processor, paired with 8GB of RAM and 128GB of onboardRead more

    The Samsung Galaxy A71 5G is a smartphone released in 2020. It features a 6.7–inch FHD+ Super AMOLED Infinity–O display with a resolution of 2400 x 1080 and an aspect ratio of 20:9. The device is powered by an octa–core Qualcomm Snapdragon 765G processor, paired with 8GB of RAM and 128GB of onboard storage (expandable up to 1TB via a microSD card). On the rear is a quad–camera setup that includes a 64MP primary camera, a 12MP ultra–wide angle lens, a 5MP macro camera, and a 5MP depth camera. On the front is a 32MP selfie shooter housed in a punch–hole cutout. The device runs Android 10 with Samsung’s custom One UI 2.0 skin and is powered by a 4500mAh battery with 25W fast charging support. Other features of the device include an in–display fingerprint scanner, dual–SIM support, NFC, and IP67 dust/water resistance.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  6. Asked: December 16, 2022In: Q & A

    What Is Csm Support?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 17, 2022 at 1:01 pm

    CSM Support stands for Customer Success Management Support. It is a customer-centric approach to providing services that ensure a customer's success with a product or service. It involves proactive outreach, ongoing communication and problem resolution to ensure customer satisfaction and loyalty. ThRead more

    CSM Support stands for Customer Success Management Support. It is a customer–centric approach to providing services that ensure a customer‘s success with a product or service. It involves proactive outreach, ongoing communication and problem resolution to ensure customer satisfaction and loyalty. The overall goal of this type of support is to not just solve customer issues, but to help customers achieve the most out of their product or service.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  7. Asked: December 16, 2022In: Q & A

    Which Of The Following Is True About Fiber?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 17, 2022 at 12:59 pm

    Fiber is a type of carbohydrate that is not digestible and helps to keep the digestive system healthy. It can also help with weight management and reduce the risk of chronic diseases such as heart disease, stroke, and type 2 diabetes.

    Fiber is a type of carbohydrate that is not digestible and helps to keep the digestive system healthy. It can also help with weight management and reduce the risk of chronic diseases such as heart disease, stroke, and type 2 diabetes.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  8. Asked: December 16, 2022In: Q & A

    In Acl Statements, Using The “Any” Keyword Is Equivalent To Using A Wildcard Mask Of What Value?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 17, 2022 at 12:59 pm

    The “any” keyword is equivalent to using a wildcard mask of 0.0.0.0/0.

    The “any” keyword is equivalent to using a wildcard mask of 0.0.0.0/0.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  9. Asked: December 16, 2022In: Q & A

    How To Generate Api Key In Postman?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 17, 2022 at 12:59 pm

    1. To generate an API key for Postman, open the Postman app and click the "Generate API Key" button on the home screen. 2. On the resulting screen, fill in the required details including your name, email address and the purpose of using the API key. 3. Click the “Generate” button and your API key wiRead more

    1. To generate an API key for Postman, open the Postman app and click the “Generate API Key“ button on the home screen.

    2. On the resulting screen, fill in the required details including your name, email address and the purpose of using the API key.

    3. Click the “Generate” button and your API key will be displayed.

    4. Copy this key and save it safely as it can be used to access your Postman account or applications.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  10. Asked: December 16, 2022In: Q & A

    Under The Osi Model Tab, How Many In Layers And Out Layers Have Information ?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 17, 2022 at 12:58 pm

    Under the OSI model, there are seven layers of information. The application layer is responsible for user interaction, presentation layer formats data for the application layer, session layer handles communication between two applications, transport layer provides end-to-end communication between twRead more

    Under the OSI model, there are seven layers of information. The application layer is responsible for user interaction, presentation layer formats data for the application layer, session layer handles communication between two applications, transport layer provides end–to–end communication between two devices, network layer provides connection paths between two devices, data link layer provides local access to the network, and physical layer provides the medium to carry data across the network.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
1 … 244 245 246 247 248 … 499

Sidebar

Top Members

Shailendra Yadav

Shailendra Yadav

  • 2k Questions
  • 52k Points
Level 50
Sneha Singh

Sneha Singh

  • 2k Questions
  • 41k Points
Level 40
Nilay Sharma

Nilay Sharma

  • 0 Questions
  • 33k Points
Level 30
  • Popular
  • Comments
  • Farwa Khalid

    Half Duplex Versus Full Duplex

    • 3 Comments
  • Farwa Khalid

    What Is Wireless Isolation?

    • 0 Comments
  • Farwa Khalid

    What Is Ping Spoofing

    • 0 Comments
  • Farwa Khalid

    What Is Radio Network Controller?

    • 0 Comments
  • Farwa Khalid

    What Is A Typical Symptom Of A CMOS Battery Failure?

    • 0 Comments
  • What is Circuit Switching - Network Classmate
    What is Circuit Switching - Network Classmate added a comment […] needs to be established. It is additive into two… November 30, 2022 at 11:36 am
  • Difference Between Router And Switch - Network Classmate
    Difference Between Router And Switch - Network Classmate added a comment […] router works in the full-duplex transmission mode. However, we… November 30, 2022 at 11:36 am
  • Communication Protocols - Network Classmate
    Communication Protocols - Network Classmate added a comment […] receiver. It is two wired protocols. Rx and Tx… November 30, 2022 at 11:35 am

  • Home
  • Groups page
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Communities
  • Polls
  • Tags
  • Badges




Footer

Important Links

  • Home
  • Article
  • Q&A
  • Guest Post

Useful Categories

  • Basic Networking
  • Basic Security
  • CCNA R & S
  • CCNA Security
  • Download

Legal Stuff

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • User Data Policy

Social Links

  • Facebook
  • Instagram
  • Twitter
  • Telegram
  • Linkedin

Copyrights © 2023 Network Classmate™. All Rights Reserved.
Designed by LeadsNut