Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In
Continue with Google
or use


Have an account? Sign In Now

Sign In

Continue with Google
or use

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Network Classmate Logo Network Classmate Logo
Sign InSign Up

Network Classmate

Network Classmate Navigation

  • Home
  • Article
  • Q&A
  • Guest Post
Search
Ask A Question

Mobile menu

Close
  • Home
  • Feed
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges

Nilay Sharma

Level 30
Ask Nilay Sharma
481 Visits
0 Followers
0 Questions
Home/ Nilay Sharma/Answers
  • About
  • Questions
  • Polls
  • Answers
  • Best Answers
  • Asked Questions
  • Followed
  • Favorites
  • Groups
  • Posts
  • Comments
  • Followers Questions
  • Followers Answers
  • Followers Posts
  • Followers Comments
  1. Asked: December 16, 2022In: Q & A

    How To Build a Weight Platform?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 16, 2022 at 8:19 pm

    1. Measure out the space you have to work with for your weight platform. Your platform should be large enough to accommodate the size of barbells and weights you plan to use. 2. Acquire the needed materials from your local hardware store. This includes: plywood, 2x4s, screws, construction adhesive,Read more

    1. Measure out the space you have to work with for your weight platform. Your platform should be large enough to accommodate the size of barbells and weights you plan to use.

    2. Acquire the needed materials from your local hardware store. This includes: plywood, 2x4s, screws, construction adhesive, and durable rubber matting.

    3. Cut two pieces of plywood that are the same size as the space you measured. These will become the outside walls of your weight platform.

    4. Cut two more pieces of plywood that are slightly smaller than the first two. These will become the interior walls of the weight platform.

    5. Attach the interior walls to the outside walls with construction adhesive and screws.

    6. Attach the rubber matting to the inside of the platform using construction adhesive. This will provide a non–slip surface and extra cushioning to protect your floor and equipment.

    7. Place the weight platform onto the desired area in your home gym and you‘re ready to workout!

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  2. Asked: December 16, 2022In: Q & A

    What Is The Definition Of 5g?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 16, 2022 at 8:18 pm

    5G is the fifth generation of cellular technology, a successor to 4G and 3G networks. It stands for “fifth-generation” and is an umbrella term used to describe a new standard of mobile networks that provide faster download speeds, lower latency, and improved capacity when compared to its predecessorRead more

    5G is the fifth generation of cellular technology, a successor to 4G and 3G networks. It stands for “fifth–generation” and is an umbrella term used to describe a new standard of mobile networks that provide faster download speeds, lower latency, and improved capacity when compared to its predecessors. 5G promises faster data rates of up to 10 gigabits per second, as well as improved energy efficiency, wider coverage, improved reliability, and enhanced security.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  3. Asked: December 16, 2022In: Q & A

    How To Enable Macros In Excel Office 365?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 16, 2022 at 8:18 pm

    To enable Macros in Excel Office 365, follow the steps below: 1. Open the Microsoft Excel Office 365 and go to File. 2. Select Options > Trust Center. 3. Click the Trust Center Settings button. 4. Under Macro Settings, select “Enable all macros” and then click OK. 5. Close and restart Excel for tRead more

    To enable Macros in Excel Office 365, follow the steps below:

    1. Open the Microsoft Excel Office 365 and go to File.

    2. Select Options > Trust Center.

    3. Click the Trust Center Settings button.

    4. Under Macro Settings, select “Enable all macros” and then click OK.

    5. Close and restart Excel for the changes to take effect.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  4. Asked: December 16, 2022In: Q & A

    Which Four Steps Are Needed To Configure A Voice Vlan?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 16, 2022 at 8:17 pm

    1. Enable the VLAN and assign a VLAN ID. 2. Assign switch ports to the Voice VLAN. 3. Configure QoS settings on the ports. 4. Configure phones to specify which VLAN they should use (Voice VLAN).

    1. Enable the VLAN and assign a VLAN ID.

    2. Assign switch ports to the Voice VLAN.

    3. Configure QoS settings on the ports.

    4. Configure phones to specify which VLAN they should use (Voice VLAN).

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  5. Asked: December 16, 2022In: Q & A

    What Information Is Used By Tcp To Reassemble And Reorder?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 16, 2022 at 8:16 pm

    TCP uses a set of data fields in each packet header to reassemble and reorder segments. These fields include the source and destination port numbers, a sequence number that indicates the order of the data within the stream, an acknowledgement number that shows which bytes in the stream have been recRead more

    TCP uses a set of data fields in each packet header to reassemble and reorder segments. These fields include the source and destination port numbers, a sequence number that indicates the order of the data within the stream, an acknowledgement number that shows which bytes in the stream have been received, a window size that declares how many bytes of data can be sent before an acknowledgment is required, and a checksum to ensure data integrity.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  6. Asked: December 16, 2022In: Q & A

    What Are The Different Types Of Phishing?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 16, 2022 at 8:16 pm

    1. Spear Phishing: Targeting specific individuals or businesses with malicious emails. 2. Clone Phishing: Sending an identical, or cloned, email to multiple targets. 3. Whaling: Targeting high-profile employees in an organization, such as C-suite executives. 4. SMS Phishing (“Smishing”): Using textRead more

    1. Spear Phishing: Targeting specific individuals or businesses with malicious emails.

    2. Clone Phishing: Sending an identical, or cloned, email to multiple targets.

    3. Whaling: Targeting high–profile employees in an organization, such as C–suite executives.

    4. SMS Phishing (“Smishing”): Using text messages as the vehicle for phishing attacks.

    5. Voice Phishing (“Vishing”): Using phone calls for phishing attacks.

    6. Search Engine Phishing: Using search engine optimization tactics to manipulate search engine results and redirect users to malicious websites.

    7. Link Manipulation: Manipulating the URL of a website to make it look like it is legitimate while actually linking to a malicious site.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  7. Asked: December 16, 2022In: Q & A

    What Is Not One Of The Three Characteristics Of Tcp In Its Role As A Reliable Delivery Protocol?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 16, 2022 at 8:14 pm

    The three characteristics of TCP in its role as a reliable delivery protocol are: error checking and correction, flow control, and ordered delivery. Fast transmission is not one of these characteristics.

    The three characteristics of TCP in its role as a reliable delivery protocol are: error checking and correction, flow control, and ordered delivery. Fast transmission is not one of these characteristics.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  8. Asked: December 16, 2022In: Q & A

    What Is Hard Drive Types?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 16, 2022 at 8:13 pm

    There are two main types of hard drives: magnetic and solid state. Magnetic hard drives are the traditional type, containing spinning disks that store data magnetically. These hard drives have varying capacities depending on how many platters they contain and how densely the data is stored. Solid stRead more

    There are two main types of hard drives: magnetic and solid state. Magnetic hard drives are the traditional type, containing spinning disks that store data magnetically. These hard drives have varying capacities depending on how many platters they contain and how densely the data is stored. Solid state hard drives (SSDs) use flash memory to store data and are significantly faster and more durable than magnetic hard drives. They also consume less power and generate less heat.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  9. Asked: December 16, 2022In: Q & A

    How To Remove a Laptop From a Domain?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 16, 2022 at 8:13 pm

    1. Log in to the laptop with the local administrator account. 2. Open Control Panel, click on System and Security, then choose System. 3. Click on Change settings, which is to the right of Computer name, domain, and workgroup settings. 4. Select the Domain radio button, and type in the name of yourRead more

    1. Log in to the laptop with the local administrator account.

    2. Open Control Panel, click on System and Security, then choose System.

    3. Click on Change settings, which is to the right of Computer name, domain, and workgroup settings.

    4. Select the Domain radio button, and type in the name of your domain.

    5. Click on the down arrow and select WORKGROUP, then click OK.

    6. You will be prompted to restart the laptop, click yes.

    7. Once restarted, the laptop will not be part of the domain anymore.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  10. Asked: December 16, 2022In: Q & A

    How To Know If You Have a Trojan?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 16, 2022 at 8:12 pm

    The most reliable way to know if you have a trojan is to run a scan with a reputable anti-virus software. Many anti-virus programs offer free scans that can detect any suspicious files or activity on your computer. In some cases, people may experience symptoms such as slow computer performance, straRead more

    The most reliable way to know if you have a trojan is to run a scan with a reputable anti–virus software. Many anti–virus programs offer free scans that can detect any suspicious files or activity on your computer. In some cases, people may experience symptoms such as slow computer performance, strange pop–up windows, or changes to their personal files that could indicate the presence of a trojan. If you‘re not sure, it‘s best to check with an anti–virus program to be sure.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
1 … 273 274 275 276 277 … 499

Sidebar

Top Members

Shailendra Yadav

Shailendra Yadav

  • 2k Questions
  • 52k Points
Level 50
Sneha Singh

Sneha Singh

  • 2k Questions
  • 41k Points
Level 40
Nilay Sharma

Nilay Sharma

  • 0 Questions
  • 33k Points
Level 30
  • Popular
  • Comments
  • Farwa Khalid

    Half Duplex Versus Full Duplex

    • 3 Comments
  • Farwa Khalid

    What Is Wireless Isolation?

    • 0 Comments
  • Farwa Khalid

    What Is Ping Spoofing

    • 0 Comments
  • Farwa Khalid

    What Is Radio Network Controller?

    • 0 Comments
  • Farwa Khalid

    What Is A Typical Symptom Of A CMOS Battery Failure?

    • 0 Comments
  • What is Circuit Switching - Network Classmate
    What is Circuit Switching - Network Classmate added a comment […] needs to be established. It is additive into two… November 30, 2022 at 11:36 am
  • Difference Between Router And Switch - Network Classmate
    Difference Between Router And Switch - Network Classmate added a comment […] router works in the full-duplex transmission mode. However, we… November 30, 2022 at 11:36 am
  • Communication Protocols - Network Classmate
    Communication Protocols - Network Classmate added a comment […] receiver. It is two wired protocols. Rx and Tx… November 30, 2022 at 11:35 am

  • Home
  • Groups page
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Communities
  • Polls
  • Tags
  • Badges




Footer

Important Links

  • Home
  • Article
  • Q&A
  • Guest Post

Useful Categories

  • Basic Networking
  • Basic Security
  • CCNA R & S
  • CCNA Security
  • Download

Legal Stuff

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • User Data Policy

Social Links

  • Facebook
  • Instagram
  • Twitter
  • Telegram
  • Linkedin

Copyrights © 2023 Network Classmate™. All Rights Reserved.
Designed by LeadsNut