Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In
Continue with Google
or use


Have an account? Sign In Now

Sign In

Continue with Google
or use

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Network Classmate Logo Network Classmate Logo
Sign InSign Up

Network Classmate

Network Classmate Navigation

  • Home
  • Article
  • Q&A
  • Guest Post
Search
Ask A Question

Mobile menu

Close
  • Home
  • Feed
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges

Nilay Sharma

Level 30
Ask Nilay Sharma
481 Visits
0 Followers
0 Questions
Home/ Nilay Sharma/Answers
  • About
  • Questions
  • Polls
  • Answers
  • Best Answers
  • Asked Questions
  • Followed
  • Favorites
  • Groups
  • Posts
  • Comments
  • Followers Questions
  • Followers Answers
  • Followers Posts
  • Followers Comments
  1. Asked: December 16, 2022In: Q & A

    Which Countries Will Not Have 5g?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 16, 2022 at 8:42 pm

    There is no absolute list of countries that will or won't have 5G, as rollout varies from country to country. As of November 2020, countries with large-scale 5G deployment include Australia, Canada, China, Japan, Korea, the UK and the US. Countries such as Brazil, France, India and Russia are beginnRead more

    There is no absolute list of countries that will or won‘t have 5G, as rollout varies from country to country. As of November 2020, countries with large–scale 5G deployment include Australia, Canada, China, Japan, Korea, the UK and the US. Countries such as Brazil, France, India and Russia are beginning to roll out 5G networks.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  2. Asked: December 16, 2022In: Q & A

    Stp Selects The Root Bridge Based On Which Parameter ?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 16, 2022 at 8:41 pm

    The Spanning Tree Protocol (STP) selects the root bridge based on Bridge Priority, which is an administratively defined parameter. The bridge with the lowest Bridge Priority value is selected as the root bridge.

    The Spanning Tree Protocol (STP) selects the root bridge based on Bridge Priority, which is an administratively defined parameter. The bridge with the lowest Bridge Priority value is selected as the root bridge.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  3. Asked: December 16, 2022In: Q & A

    How To Implement Group Policy In Active Directory?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 16, 2022 at 8:40 pm

    1. Create a Group Policy Object (GPO) in Group Policy Management Console (GPMC). 2. Configure the GPO with the desired settings to be applied to users or systems. 3. Link the GPO to an Active Directory container such as an Organizational Unit (OU). 4. Optionally, apply a security filter to restrictRead more

    1. Create a Group Policy Object (GPO) in Group Policy Management Console (GPMC).

    2. Configure the GPO with the desired settings to be applied to users or systems.

    3. Link the GPO to an Active Directory container such as an Organizational Unit (OU).

    4. Optionally, apply a security filter to restrict who will receive the policy settings.

    5. Test the GPO to ensure it works as expected.

    6. Monitor for policy changes or user complaints.

    7. Repeat the process for any additional GPOs that need to be created.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  4. Asked: December 16, 2022In: Q & A

    How To Install Vmware Tools On Virtual Machine?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 16, 2022 at 8:39 pm

    1. Start up your virtual machine and log into the OS. 2. Open a web browser and go to the VMware Download Page and download the VMware Tools archive file to your computer. 3. Launch the VMware Infrastructure client, select the virtual machine in the inventory and click Summary tab. Click the InstallRead more

    1. Start up your virtual machine and log into the OS.

    2. Open a web browser and go to the VMware Download Page and download the VMware Tools archive file to your computer.

    3. Launch the VMware Infrastructure client, select the virtual machine in the inventory and click Summary tab. Click the Install/Upgrade VMware Tools link under the Guest Operating System section.

    4. On the virtual machine desktop, a CD icon should appear on the desktop. Double–click the CD icon and the VMware Tools setup wizard should start automatically. If it does not, then browse to the mounted CD–ROM drive (typically D:\setup.exe)

    5. Follow the prompts for the installation; the default options are generally sufficient. Reboot the virtual machine when prompted.

    6. Once the virtual machine reboots, log back in and the installation should be complete.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  5. Asked: December 16, 2022In: Q & A

    How To Protect Yourself From Phishing?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 16, 2022 at 8:31 pm

    1. Look out for signs of a phishing attack: Suspicious emails, messages, or websites containing misspellings, grammatical errors, and links that go to unfamiliar websites. 2. Do not click on links in any suspicious email or message. Instead, type the website name directly into your web browser. 3. BRead more

    1. Look out for signs of a phishing attack: Suspicious emails, messages, or websites containing misspellings, grammatical errors, and links that go to unfamiliar websites.

    2. Do not click on links in any suspicious email or message. Instead, type the website name directly into your web browser.

    3. Beware of emails or posts asking for personal information (e.g. user name and password). Legitimate companies will never ask for this information via email.

    4. Install anti–virus software and a secure firewall to protect your computer from malicious programs like spyware and viruses.

    5. Be especially wary of emails or messages with urgent requests for action. Legitimate companies will rarely make urgent requests for personal information.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  6. Asked: December 16, 2022In: Q & A

    How Many Bytes Are In a Packet?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 16, 2022 at 8:30 pm

    The size of a packet varies greatly depending on the protocol being used, the characteristics of the data being transmitted, and other factors. In general, a packet can range from as small as 64 bytes to several thousand bytes.

    The size of a packet varies greatly depending on the protocol being used, the characteristics of the data being transmitted, and other factors. In general, a packet can range from as small as 64 bytes to several thousand bytes.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  7. Asked: December 16, 2022In: Q & A

    What Is 20 Subnet Mask?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 16, 2022 at 8:29 pm

    The subnet mask for a network with 20 subnets is 255.255.240.0.

    The subnet mask for a network with 20 subnets is 255.255.240.0.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  8. Asked: December 16, 2022In: Q & A

    How Many Addresses In Class B?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 16, 2022 at 8:29 pm

    There are 2^16 (65,536) addresses in a Class B address.

    There are 2^16 (65,536) addresses in a Class B address.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  9. Asked: December 16, 2022In: Q & A

    Which Three Protocols Operate At The Application Layer Of The Tcp/Ip Model?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 16, 2022 at 8:29 pm

    1. Hypertext Transfer Protocol (HTTP) 2. File Transfer Protocol (FTP) 3. Simple Mail Transfer Protocol (SMTP)

    1. Hypertext Transfer Protocol (HTTP)

    2. File Transfer Protocol (FTP)

    3. Simple Mail Transfer Protocol (SMTP)

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  10. Asked: December 16, 2022In: Q & A

    What Routing Table Entry Has A Next Hop Address?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 16, 2022 at 8:29 pm

    A routing table entry with a next hop address will usually include the IP address of the router (or other network device) that the traffic needs to be sent to in order to reach its destination. It will also include a network address and subnet mask, which specifies the network the destination resideRead more

    A routing table entry with a next hop address will usually include the IP address of the router (or other network device) that the traffic needs to be sent to in order to reach its destination. It will also include a network address and subnet mask, which specifies the network the destination resides in.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
1 … 271 272 273 274 275 … 499

Sidebar

Top Members

Shailendra Yadav

Shailendra Yadav

  • 2k Questions
  • 52k Points
Level 50
Sneha Singh

Sneha Singh

  • 2k Questions
  • 41k Points
Level 40
Nilay Sharma

Nilay Sharma

  • 0 Questions
  • 33k Points
Level 30
  • Popular
  • Comments
  • Farwa Khalid

    Half Duplex Versus Full Duplex

    • 3 Comments
  • Farwa Khalid

    What Is Wireless Isolation?

    • 0 Comments
  • Farwa Khalid

    What Is Ping Spoofing

    • 0 Comments
  • Farwa Khalid

    What Is Radio Network Controller?

    • 0 Comments
  • Farwa Khalid

    What Is A Typical Symptom Of A CMOS Battery Failure?

    • 0 Comments
  • What is Circuit Switching - Network Classmate
    What is Circuit Switching - Network Classmate added a comment […] needs to be established. It is additive into two… November 30, 2022 at 11:36 am
  • Difference Between Router And Switch - Network Classmate
    Difference Between Router And Switch - Network Classmate added a comment […] router works in the full-duplex transmission mode. However, we… November 30, 2022 at 11:36 am
  • Communication Protocols - Network Classmate
    Communication Protocols - Network Classmate added a comment […] receiver. It is two wired protocols. Rx and Tx… November 30, 2022 at 11:35 am

  • Home
  • Groups page
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Communities
  • Polls
  • Tags
  • Badges




Footer

Important Links

  • Home
  • Article
  • Q&A
  • Guest Post

Useful Categories

  • Basic Networking
  • Basic Security
  • CCNA R & S
  • CCNA Security
  • Download

Legal Stuff

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • User Data Policy

Social Links

  • Facebook
  • Instagram
  • Twitter
  • Telegram
  • Linkedin

Copyrights © 2023 Network Classmate™. All Rights Reserved.
Designed by LeadsNut