Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In
Continue with Google
or use


Have an account? Sign In Now

Sign In

Continue with Google
or use

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Network Classmate Logo Network Classmate Logo
Sign InSign Up

Network Classmate

Network Classmate Navigation

  • Home
  • Article
  • Q&A
  • Guest Post
Search
Ask A Question

Mobile menu

Close
  • Home
  • Feed
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges

Nilay Sharma

Level 30
Ask Nilay Sharma
481 Visits
0 Followers
0 Questions
Home/ Nilay Sharma/Answers
  • About
  • Questions
  • Polls
  • Answers
  • Best Answers
  • Asked Questions
  • Followed
  • Favorites
  • Groups
  • Posts
  • Comments
  • Followers Questions
  • Followers Answers
  • Followers Posts
  • Followers Comments
  1. Asked: December 28, 2022In: Q & A

    How To Remove Macros From Excel?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 29, 2022 at 6:24 pm

    1. Open the Excel file. 2. Go to the “Developer” tab on the Ribbon. If you don’t see it, go to File > Options > Customize Ribbon and check the Developer box. 3. Click on the “Visual Basic” button. 4. Select the project that contains the macro by double-clicking on the project name. 5. Double-cRead more

    1. Open the Excel file.

    2. Go to the “Developer” tab on the Ribbon. If you don’t see it, go to File > Options > Customize Ribbon and check the Developer box.

    3. Click on the “Visual Basic” button.

    4. Select the project that contains the macro by double–clicking on the project name.

    5. Double–click on the module that contains the macro you want to delete.

    6. Delete the code for the macro.

    7. Save the workbook when prompted.

    8. Close the Visual Basic Editor.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  2. Asked: December 29, 2022In: Q & A

    What Is Amazon Cloud Services?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 29, 2022 at 6:23 pm

    Amazon Web Services (AWS) is a cloud computing platform that allows businesses to host and access applications, store data and manage services. It's the largest cloud computing provider in the world, with over 175 services ranging from Compute, Storage, Database, Networking, and Analytics, to ArtifiRead more

    Amazon Web Services (AWS) is a cloud computing platform that allows businesses to host and access applications, store data and manage services. It‘s the largest cloud computing provider in the world, with over 175 services ranging from Compute, Storage, Database, Networking, and Analytics, to Artificial Intelligence, Blockchain, Machine Learning, Robotics, Mobile, Internet of Things (IoT), and Augmented/Virtual Reality. AWS delivers on–demand computing power, security, and storage services to clients in over 190 countries around the world.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  3. Asked: December 29, 2022In: Q & A

    What Is Network Latency?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 29, 2022 at 6:23 pm

    Network latency is the time it takes for a packet of data to travel from one point to another on a network. It can be affected by several different factors, including the speed of the network, the distance between the two points, and any obstructions such as walls or other hardware in the way. LatenRead more

    Network latency is the time it takes for a packet of data to travel from one point to another on a network. It can be affected by several different factors, including the speed of the network, the distance between the two points, and any obstructions such as walls or other hardware in the way. Latency is usually measured in milliseconds.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  4. Asked: December 29, 2022In: Q & A

    What Is Bridge Computer?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 29, 2022 at 6:23 pm

    Bridge computer is an intermediate computer or network device, or both, which enables communication between two or more networks and also controls the traffic coming through those networks. It is commonly used in home and office networks to connect them to the Internet. Bridge computers can filter oRead more

    Bridge computer is an intermediate computer or network device, or both, which enables communication between two or more networks and also controls the traffic coming through those networks. It is commonly used in home and office networks to connect them to the Internet. Bridge computers can filter out traffic based on its source and destination, improving both the security of the network and its performance.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  5. Asked: December 28, 2022In: Q & A

    How To Scan Network In Windows?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 29, 2022 at 6:22 pm

    1. Open the Command Prompt. This can be done by searching for “cmd” in the Windows search bar. 2. Enter the command “ipconfig /release” and press enter to release your current connection information. 3. Enter the command “ipconfig /renew” and press enter to renew your connection information. 4. EnteRead more

    1. Open the Command Prompt. This can be done by searching for “cmd” in the Windows search bar.

    2. Enter the command “ipconfig /release” and press enter to release your current connection information.

    3. Enter the command “ipconfig /renew” and press enter to renew your connection information.

    4. Enter the command “net view” and press enter to view a list of computers currently connected to the same network.

    5. Enter the command “arp –a” and press enter to view the IP addresses associated with each computer on the network.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  6. Asked: December 28, 2022In: Q & A

    How To Configure Extended Access List?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 29, 2022 at 6:22 pm

    1. Log into the router with a secure shell (SSH) or Telnet. 2. Enter the privileged mode on the router by entering the “enable” command. 3. Create the extended access list using the “access-list” command. 4. Specify the access list number, which must be between 100 and 199, followed by an action sucRead more

    1. Log into the router with a secure shell (SSH) or Telnet.

    2. Enter the privileged mode on the router by entering the “enable” command.

    3. Create the extended access list using the “access–list” command.

    4. Specify the access list number, which must be between 100 and 199, followed by an action such as “permit” or “deny”.

    5. Enter the source IP address of the traffic you wish to control.

    6. Enter the destination IP address, if applicable.

    7. Specify the protocol or ICMP type you wish to filter.

    8. Apply the access list to an interface with the “ip access–group” command, followed by the access list number and the interface name.

    9. Save the changes made with the “wr” command.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  7. Asked: December 28, 2022In: Q & A

    How To Count Hops In Traceroute?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 29, 2022 at 6:21 pm

    1. To count the hops in a traceroute, you first need to run a traceroute. This can be done through a command prompt on Windows or terminal on MacOS and Linux. 2. After running the traceroute, you will see a list of IP addresses that the traceroute was able to trace. The number of IP addresses listedRead more

    1. To count the hops in a traceroute, you first need to run a traceroute. This can be done through a command prompt on Windows or terminal on MacOS and Linux.

    2. After running the traceroute, you will see a list of IP addresses that the traceroute was able to trace. The number of IP addresses listed will correspond to the number of hops. So, if there are 10 IP addresses listed, then the traceroute had 10 hops along the route.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  8. Asked: December 28, 2022In: Q & A

    How To Start Your Own Wifi Company?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 29, 2022 at 6:21 pm

    1. Research your target market and areas of service. You can’t just open a WiFi company without taking into account the needs of your customers and the areas where you will provide service. You should consider the type of clients you want to serve, their needs, and the areas you can realistically prRead more

    1. Research your target market and areas of service. You can’t just open a WiFi company without taking into account the needs of your customers and the areas where you will provide service. You should consider the type of clients you want to serve, their needs, and the areas you can realistically provide service to.

    2. Create a business plan. Before you start any business, no matter how big or small, you should have a plan in place. This will help you focus on your goals and create an organized strategy that you can use to achieve them.

    3. Secure financing. Depending on the scope of your business, you may need to secure financing from a bank or other institution. Make sure you have a solid business plan that outlines your goals and objectives so that potential lenders know that you are serious about your business.

    4. Find a provider and purchase the hardware. You need to find a reliable provider that can provide the type of service your customer base requires. You will also need to invest in the necessary hardware, such as routers, switches and access points.

    5. Promote your business. Once you have secured financing and purchased the necessary equipment, you need to promote your business to spread the word. You should think of creative ways to market your services, such as creating a website, using social media, or attending industry trade shows.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  9. Asked: December 28, 2022In: Q & A

    How Long Is a Subnet Mask?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 29, 2022 at 6:20 pm

    A subnet mask is typically a 32-bit value.

    A subnet mask is typically a 32–bit value.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  10. Asked: December 28, 2022In: Q & A

    How To Check Cpu Usage Of a Process In Linux?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 29, 2022 at 6:20 pm

    1. Using Top Command: The top command displays all the running processes along with their CPU usage. It is the most popular tool used to monitor the system resources such as CPU utilization, Memory utilization and Disk I/O etc. To check the CPU usage of a particular process, use the following commanRead more

    1. Using Top Command: The top command displays all the running processes along with their CPU usage. It is the most popular tool used to monitor the system resources such as CPU utilization, Memory utilization and Disk I/O etc. To check the CPU usage of a particular process, use the following command.

    Syntax: top –p

    PID

    Example: top –p 741

    2. Using ps command: The ps command is used to display information about the running processes and their resource utilization. To check the CPU utilization of a particular process, use the following command.

    Syntax:

    ps –p PID –o %cpu

    Example:

    ps –p 741 –o %cpu

    3. Using ps auxcommand: The ps aux command displays all the running processes on the system along with their resource utilization details like CPU and Memory usage. This command provides more detailed output than the ps command. To check the CPU utilization of a particular process, use the following command.

    Syntax: ps aux |

    grep PID

    Example: ps aux | grep 741

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
1 … 55 56 57 58 59 … 499

Sidebar

Top Members

Shailendra Yadav

Shailendra Yadav

  • 2k Questions
  • 52k Points
Level 50
Sneha Singh

Sneha Singh

  • 2k Questions
  • 41k Points
Level 40
Nilay Sharma

Nilay Sharma

  • 0 Questions
  • 33k Points
Level 30
  • Popular
  • Comments
  • Farwa Khalid

    Half Duplex Versus Full Duplex

    • 3 Comments
  • Farwa Khalid

    What Is Wireless Isolation?

    • 0 Comments
  • Farwa Khalid

    What Is Ping Spoofing

    • 0 Comments
  • Farwa Khalid

    What Is Radio Network Controller?

    • 0 Comments
  • Farwa Khalid

    What Is A Typical Symptom Of A CMOS Battery Failure?

    • 0 Comments
  • What is Circuit Switching - Network Classmate
    What is Circuit Switching - Network Classmate added a comment […] needs to be established. It is additive into two… November 30, 2022 at 11:36 am
  • Difference Between Router And Switch - Network Classmate
    Difference Between Router And Switch - Network Classmate added a comment […] router works in the full-duplex transmission mode. However, we… November 30, 2022 at 11:36 am
  • Communication Protocols - Network Classmate
    Communication Protocols - Network Classmate added a comment […] receiver. It is two wired protocols. Rx and Tx… November 30, 2022 at 11:35 am

  • Home
  • Groups page
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Communities
  • Polls
  • Tags
  • Badges




Footer

Important Links

  • Home
  • Article
  • Q&A
  • Guest Post

Useful Categories

  • Basic Networking
  • Basic Security
  • CCNA R & S
  • CCNA Security
  • Download

Legal Stuff

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • User Data Policy

Social Links

  • Facebook
  • Instagram
  • Twitter
  • Telegram
  • Linkedin

Copyrights © 2023 Network Classmate™. All Rights Reserved.
Designed by LeadsNut