Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In
Continue with Google
or use


Have an account? Sign In Now

Sign In

Continue with Google
or use

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Network Classmate Logo Network Classmate Logo
Sign InSign Up

Network Classmate

Network Classmate Navigation

  • Home
  • Article
  • Q&A
  • Guest Post
Search
Ask A Question

Mobile menu

Close
  • Home
  • Feed
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges

Nilay Sharma

Level 30
Ask Nilay Sharma
481 Visits
0 Followers
0 Questions
Home/ Nilay Sharma/Answers
  • About
  • Questions
  • Polls
  • Answers
  • Best Answers
  • Asked Questions
  • Followed
  • Favorites
  • Groups
  • Posts
  • Comments
  • Followers Questions
  • Followers Answers
  • Followers Posts
  • Followers Comments
  1. Asked: December 23, 2022In: Q & A

    How To Activate Macros In Excel?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 29, 2022 at 9:32 pm

    1. Open the workbook containing the macro you want to activate. 2. Click the "Developer" tab. 3. Click the "Visual Basic" button in the Ribbon. 4. Double-click the worksheet containing the macro you want to activate. 5. Select the macro from the left-hand window. 6. Click the Run button at the top oRead more

    1. Open the workbook containing the macro you want to activate.

    2. Click the “Developer“ tab.

    3. Click the “Visual Basic“ button in the Ribbon.

    4. Double–click the worksheet containing the macro you want to activate.

    5. Select the macro from the left–hand window.

    6. Click the Run button at the top of the VB Editor window. The macro will execute immediately.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  2. Asked: December 23, 2022In: Q & A

    How Does a Virus Attack a Computer?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 29, 2022 at 9:31 pm

    A virus is a type of malicious software that can spread from one computer to another, often through the downloading of infected files or visiting corrupted websites. Once it has been downloaded onto a computer, it works by infiltrating the system’s security measures and infecting other executable fiRead more

    A virus is a type of malicious software that can spread from one computer to another, often through the downloading of infected files or visiting corrupted websites. Once it has been downloaded onto a computer, it works by infiltrating the system’s security measures and infecting other executable files or documents in folders or drives on the computer. It can also cause an infected computer to send itself to other computers, which can spread the virus further. While a virus may replicate itself and spread from computer to computer, its main purpose is usually to cause damage to an infected system. This can be done by deleting files, corrupting data, modifying settings, or even stealing sensitive information.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  3. Asked: December 23, 2022In: Q & A

    How To Transfer Voicemail Messages To a Computer?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 29, 2022 at 9:30 pm

    1. Use the Voicemail System to Save the Messages: Most phone systems and voicemail services offer a way to save messages directly to a computer. Check your user guide or contact your system administrator for details on how to do this. 2. Connect Your Phone to Your Computer: Most phones have a data cRead more

    1. Use the Voicemail System to Save the Messages: Most phone systems and voicemail services offer a way to save messages directly to a computer. Check your user guide or contact your system administrator for details on how to do this.

    2. Connect Your Phone to Your Computer: Most phones have a data cable that allows you to connect it directly to a computer. Once the phone is connected, use file transfer software to move the files from your phone to the computer.

    3. Use an Audio Cable: You can also use an audio cable to connect the phone to the computer. This will allow you to record directly onto the computer or use audio recording software to save the message.

    4. Use Third–Party Recording Software: There are also some third–party programs that can be used to record phone conversations or voicemails. These programs offer advanced features such as automatic transcription, archiving and messaging organization.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  4. Asked: December 23, 2022In: Q & A

    How To Whitelist a Website On Mac?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 29, 2022 at 9:29 pm

    1. Open System Preferences from your Dock. 2. Click on the “Security & Privacy” icon. 3. Select the “Privacy” tab. 4. Select “Firewall Options” from the left-hand menu. 5. Click the lock symbol in the bottom left corner to make changes. 6. Enter your admin password. 7. Click “Firewall Options” aRead more

    1. Open System Preferences from your Dock.

    2. Click on the “Security & Privacy” icon.

    3. Select the “Privacy” tab.

    4. Select “Firewall Options” from the left–hand menu.

    5. Click the lock symbol in the bottom left corner to make changes.

    6. Enter your admin password.

    7. Click “Firewall Options” again.

    8. Click “Add”.

    9. Select the application, port, or URL you’d like to whitelist.

    10. Click “Add“ and close the window.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  5. Asked: December 29, 2022In: Q & A

    How To Get Your Own Wifi?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 29, 2022 at 9:28 pm

    1. Determine your budget. 2. Choose the network hardware you need. 3. Purchase the equipment. 4. Set up the router. 5. Connect your devices to the network. 6. Secure your home network.

    1. Determine your budget.

    2. Choose the network hardware you need.

    3. Purchase the equipment.

    4. Set up the router.

    5. Connect your devices to the network.

    6. Secure your home network.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  6. Asked: December 29, 2022In: Q & A

    What Is Tcp Ip Model?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 29, 2022 at 9:28 pm

    The TCP/IP model (Transmission Control Protocol/Internet Protocol) is the communication protocol used for connecting hosts to the Internet and other networks. It includes four layers which define the communication model between two endpoints: the Application layer, the Transport layer, the InternetRead more

    The TCP/IP model (Transmission Control Protocol/Internet Protocol) is the communication protocol used for connecting hosts to the Internet and other networks. It includes four layers which define the communication model between two endpoints: the Application layer, the Transport layer, the Internet layer, and the Link layer. This model is sometimes referred to as the Internet Protocol Suite or the TCP/IP Stack. Each layer adds a specific set of protocols and services to facilitate data communication between hosts.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  7. Asked: December 29, 2022In: Q & A

    What Is Engry Ip Scanner?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 29, 2022 at 9:27 pm

    An Angry IP Scanner (also known as ipscan) is a free and open-source network scanner created by Anton Keks. It is used to scan IP addresses and ports to find open ports, map network topologies, and identify vulnerable services. It also includes support for ping scanning, trace routing, OS detection,Read more

    An Angry IP Scanner (also known as ipscan) is a free and open–source network scanner created by Anton Keks. It is used to scan IP addresses and ports to find open ports, map network topologies, and identify vulnerable services. It also includes support for ping scanning, trace routing, OS detection, and more.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  8. Asked: December 29, 2022In: Q & A

    What Is Runas Command?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 29, 2022 at 9:18 pm

    The Runas command is a Microsoft Windows command that allows a user to execute a program or command with different permissions than the user’s current logon provides. This capability is useful for users who need to run programs that require different privileges than their current user account grantsRead more

    The Runas command is a Microsoft Windows command that allows a user to execute a program or command with different permissions than the user’s current logon provides. This capability is useful for users who need to run programs that require different privileges than their current user account grants. The administrator can use the Runas command to start a program as if the user were logged onto the system with a different account, one that has different access rights.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  9. Asked: December 29, 2022In: Q & A

    What Is Radio Broadcasting?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 29, 2022 at 9:17 pm

    Radio broadcasting is the transmission of audio content through radio waves to a number of receivers or listeners. It is usually done in one-way communication, as opposed to two-way communication like that found in telephone conversations. Broadcast radio stations primarily use AM and FM frequenciesRead more

    Radio broadcasting is the transmission of audio content through radio waves to a number of receivers or listeners. It is usually done in one–way communication, as opposed to two–way communication like that found in telephone conversations. Broadcast radio stations primarily use AM and FM frequencies to transmit their signals, while satellite radio utilizes digital signal compression technology. Radio broadcasting can be used to communicate news, entertainment, music, talk shows, sports, and other programming.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  10. Asked: December 29, 2022In: Q & A

    What Is Canon Eos T7i?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 29, 2022 at 9:16 pm

    Canon EOS Rebel T7i (known as the Canon EOS 800D in the UK and the Canon Kiss X9i in Japan) is an entry-level digital SLR camera from Canon. It is equipped with a 24.2 megapixel APS-C CMOS image sensor, a 45-point autofocus system, dual pixel CMOS AF, Full HD video up to 60fps, a 3 inch vari-angle tRead more

    Canon EOS Rebel T7i (known as the Canon EOS 800D in the UK and the Canon Kiss X9i in Japan) is an entry–level digital SLR camera from Canon. It is equipped with a 24.2 megapixel APS–C CMOS image sensor, a 45–point autofocus system, dual pixel CMOS AF, Full HD video up to 60fps, a 3 inch vari–angle touchscreen and built–in Wi–Fi and Bluetooth connectivity. The camera also features a shutter speed range of 30 seconds to 1/4000th of a second. The Canon EOS Rebel T7i is targeted at beginner photographers who want a versatile camera that can be used for a variety of tasks.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
1 … 48 49 50 51 52 … 499

Sidebar

Top Members

Shailendra Yadav

Shailendra Yadav

  • 2k Questions
  • 52k Points
Level 50
Sneha Singh

Sneha Singh

  • 2k Questions
  • 41k Points
Level 40
Nilay Sharma

Nilay Sharma

  • 0 Questions
  • 33k Points
Level 30
  • Popular
  • Comments
  • Farwa Khalid

    Half Duplex Versus Full Duplex

    • 3 Comments
  • Farwa Khalid

    What Is Wireless Isolation?

    • 0 Comments
  • Farwa Khalid

    What Is Ping Spoofing

    • 0 Comments
  • Farwa Khalid

    What Is Radio Network Controller?

    • 0 Comments
  • Farwa Khalid

    What Is A Typical Symptom Of A CMOS Battery Failure?

    • 0 Comments
  • What is Circuit Switching - Network Classmate
    What is Circuit Switching - Network Classmate added a comment […] needs to be established. It is additive into two… November 30, 2022 at 11:36 am
  • Difference Between Router And Switch - Network Classmate
    Difference Between Router And Switch - Network Classmate added a comment […] router works in the full-duplex transmission mode. However, we… November 30, 2022 at 11:36 am
  • Communication Protocols - Network Classmate
    Communication Protocols - Network Classmate added a comment […] receiver. It is two wired protocols. Rx and Tx… November 30, 2022 at 11:35 am

  • Home
  • Groups page
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Communities
  • Polls
  • Tags
  • Badges




Footer

Important Links

  • Home
  • Article
  • Q&A
  • Guest Post

Useful Categories

  • Basic Networking
  • Basic Security
  • CCNA R & S
  • CCNA Security
  • Download

Legal Stuff

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • User Data Policy

Social Links

  • Facebook
  • Instagram
  • Twitter
  • Telegram
  • Linkedin

Copyrights © 2023 Network Classmate™. All Rights Reserved.
Designed by LeadsNut