Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
What Is Advertising Used For? Check All That Apply
What Is Advertising Used For? Check All That Apply. The advertising is mainly used to increase the consumer’s taste and to increase the value of the products and bring awareness to the company branding. Today, let us discuss what is advertising and its types in detail. The term advertising is nothinRead more
What Is Advertising Used For? Check All That Apply.
The advertising is mainly used to increase the consumer’s taste and to increase the value of the products and bring awareness to the company branding. Today, let us discuss what is advertising and its types in detail.
The term advertising is nothing but communication within the market. This advertising will be able to sponsor all the nonpersonal messages in order to make the product or to sell the product.
The advertising is nothing but the business that is mainly used to promote their business or in order to promote their own products, they use the term advertising. After the advertising is developed for any of the particular products and this will be sent to multiple media or multiple channels along with all the traditional media.
The traditional media is nothing but magazines and newspapers or any of the direct mail. It can also be any text message. This type of display through any type of medium is called an advertisement.
Now let us discuss some of the types of advertising with examples. The advertisements appeal to be of two types they are emotional advertising and other one is called rational advertising. It normally contains 23 types of appeals that can work very effectively.
Now, let us know what are the 23 types of appeals. The first type of appeal is called a personal appeal. This personal appeal is called the emotional appeal which can able to persuade all types of the emotions like sad happy and many more.
Another type is called a social appeal. The social appeal is nothing but the one that can able to capture all the popular trends that are present. It can able to acquire its social desire.
Another type of appeal is humor appeal. This humor appeal is nothing but the one that can able to grab the attention of the users. But this humor may come under the term subjective.
The term subjective is nothing, it may or may not be liked by many persons. Another type of appeal is called adventure appeal. This adventure appeal creates liveliness, the example of this adventure appeal is nothing but the car companies or different lifestyle brands. This adventure appeal can able to identify where the adventure is going to lead us.
In simple terms, advertising is all about bringing awareness among people to know about any product and to increase their sales. It is simpler to promote the product or business that you own and influence the customers to drive them to buy your products. The way of advertising can be of many types as we discussed earlier.
It depends on what product we are trying to consume by knowing the taste of the customers and to increase the sale of the business or the product that you are trying to promote.
Just by seeing those advertisements, the customers will get an idea about the details of the product that we are using. Hence, advertising will play an essential role in order to increase sales.
See lessHow Does A Router Handle A Packet Destined For A Network That Is Not Listed In The Routing Table?
How Does A Router Handle A Packet Destined For A Network That Is Not Listed In The Routing Table? Here, if the packet cannot be found in the specified routing table then we move it to another routing table in order to check the packet which we want to send to the destination network. Today, let us lRead more
How Does A Router Handle A Packet Destined For A Network That Is Not Listed In The Routing Table?
Here, if the packet cannot be found in the specified routing table then we move it to another routing table in order to check the packet which we want to send to the destination network. Today, let us learn about the topic of the router and how the router will be able to send the packets to the specified network.
We all know that the router is nothing but a device that can able to send and receive packets between the two networks. we can connect any number of networks to a single network.
Normally we will connect at least two networks to a single router.
In order to maintain communication between the two devices, we use the router. In order to maintain the network between the two routers, we need an internet service provider which can make the communication network between the two routers or two networks.
Let us take an example to understand this concept in detail. For suppose if we want to send the packets to the specified destination address, here firstly it will check the routing table to make sure if the packet Is present or not. If the packet is not found in the routing table then we move to another router and try to find the packet that we are searching for.
Now let us know the working of the router in detail. Let say we have two ports to a single router or two interfaces that are connected to the router. Here let say one of the interfaces is going to connect to the network called the local area network and another interface will be connected and communicating through the router of the network
Hence, the two sides of the router can be used for many different purposes. One will be used to connect to the network and the other will be used to connect to the internet service provider. The internet service provider can be shortly called the ISP, which can be used to provide the internet for all the devices that are connected to the network.
We consider routers as the pre-determined paths that can able to send the packets from one to another subnet.
Now want is routing table. How the routing table can be used in the network
The routing table will store all the TCP and the IP information in it. Here the router will be able to use the router’s destination address from the routing table and transmit the packets to its specified destination address. This information will be compared with the information that is stored in the routing table.
The routing table consists of the destination IP address, subnet mask, gateways and the interface
The subnet mask is considered as the network I’d and the types of interfaces that are being used in it.
Hence, if the required address cannot be found in the routing table then we move to another router to search.
See lessWhat Type Of Route Is Indicated By The Code C In An Ipv4 Routing Table On A Cisco Router?
What Type Of Route Is Indicated By The Code C In An Ipv4 Routing Table On A Cisco Router? The directly connected routes can be indicated by the route by the code C in an ipv4 routing table on a Cisco router. Today let us learn about the directly connected routes in detail and the types of codes in tRead more
What Type Of Route Is Indicated By The Code C In An Ipv4 Routing Table On A Cisco Router?
The directly connected routes can be indicated by the route by the code C in an ipv4 routing table on a Cisco router. Today let us learn about the directly connected routes in detail and the types of codes in the ipv4 routing table. We all know that the router will use the routing table in order to transmit or forward the packets to the destination network or address.
Here the routing table can able to describe all the information like the listing of all the networks that a router needs. It also describes the best path in order to forward the packets to their destination address.
Now let us discuss the ipv4 routing table in detail. Before we discuss the routing table, let us know about the network topology in detail. In the network topology, all the networks will be connected to every router and maintain the connection between the two routers.
The routing table consists of some of the codes. These codes represent how each of the networks will be able to route. We have different codes like L, D, C, S, R, M, B, and many more. Each of these codes represents how the router works. The code C is nothing but represents connected and the code L represents the local.
We can able to see several different types of columns in the routing table like destination, network mask, gateways, interface, metrics, and many more.
The routing table consists of the packet’s destination address. The routing table also consists of the default row. This default information will be used when no other information matches. That means if the destination address of the packets doesn’t match any of the addresses that are present then the default information will be getting used.
In the routing table, we can also have a metric. This metric will represent how many steps will it take to reach the destination address. If it only takes one step then the metric will be 1, if it takes two steps then the metric will be 2.
The routing table also consists of the interface, these interfaces are very essential in order to understand the routing table and the routing in detail. We have ethernet switches, these ethernet switches consist of the ethernet interfaces and the ethernet frames. These Ethernet switches will be mainly focused on layer two of the OSI model.
And the routers also consist of different types of interfaces. Now let us know each of them in detail. The routers mainly focus on layer 3 of the IP packet. This is where we look for the destination address.
The router can support different types of the interfaces like ethernet, serial, etc. The general format can be in the form of typing its slot and the port number of that particular slot. Here all the directly connected routes can be indicated by the code C of the ipv4 routing table on a Cisco router.
See lessWhat Does Tcp Do If The Sending Source Detects Network Congestion On The Path To The Destination?
What Does Tcp Do If The Sending Source Detects Network Congestion On The Path To The Destination? When the sending source detects the network congestion it will reduce the amount of data needed to send. This will be done before the acknowledgments are received from the destination address. Today letRead more
What Does Tcp Do If The Sending Source Detects Network Congestion On The Path To The Destination?
When the sending source detects the network congestion it will reduce the amount of data needed to send. This will be done before the acknowledgments are received from the destination address. Today let us discuss the network congestion in detail along with the congestion control principles in detail.
Normally the congestion occurs when more data will be sent at a time to the destination address. When we try to send more amount of data, the network cannot be able to handle the data hence the congestion occurs.
Now, what we should do in order to avoid the congestion. There are two ways where we can able to identify the congestion.
Firstly, when the data is sent, it may take a longer time or delay while receiving the data due to the cause of the congestion. And another reason can be, the packets can be dropped due to the overflow of the buffer.
Many people will confuse between congestion control and flow control. But in reality, congestion control and flow control will be two completely different things. Now let us know the basic difference between congestion control and flow control.
In the flow control, it can able to prevent the sender from overwhelming the receiver. But in the congestion control, prevents the senders from overwhelming the network area.
Here, we need to know that the through can never be exceeded the capacity. Hence this is one of the causes of the congestion.
This network congestion normally occurs when a network node is carrying more data than its capacity. When network congestion occurs, it causes delays and loss of the packets and it can also block the new connections that are taking place.
The aggressive retransmission of the data due to the packet loss will increase more congestion of the data.
The networks which will use congestion control and congestion avoidance will have less congestion in them.
We can also implement some of the priority techniques or schemes. That means transmitting the packets only which have a higher priority than the other.
Another way to avoid the congestion is to allocation the network resources explicitly will definitely avoid the congestion of the data. The best example of this is using contention-free transmission opportunities.
And the basic way to decrease the congestion is to reduce the amount of data that we are going to send. Hence, we can able to avoid packet loss, network congestion, and delays in receiving the packets.
Here, when the acknowledgments cannot be seen in a timely manner, then the sender will send the packets will fewer data present in them. Thinking as congestion occurs, it reduces the amount of the data that is going to be transmitted. Hence, we can say that when the sender sends a fewer number of packets than the usual data that is used to send, then we can assume that there is some congestion or packet loss that has taken place.
See lessWhat Characteristic Of Electricity Is Expressed In Watts?
What Characteristic Of Electricity Is Expressed In Watts? Watts is the unit that is used to measure the electric power. Here when the energy that is required in order to move the electrons from the circuit is multiplied by the number of electrons that are flowing through the circuit per second. TodaRead more
What Characteristic Of Electricity Is Expressed In Watts?
Watts is the unit that is used to measure the electric power. Here when the energy that is required in order to move the electrons from the circuit is multiplied by the number of electrons that are flowing through the circuit per second.
Today let us learn about basic electricity along with the powers and watts in detail.
Let us take an example to understand the concept of electricity in detail. Let say a power supply is connected to the motor, here the energy that is transmitted from the power supply to the motor is called electricity. Hence, we call it electrical power.
The term power is nothing but the rate at which the energy gets supplied to the motor. we have a unit for the power that is called the watt.
Here one watt is equal to the 1 joule/second. As we said earlier when we say 1.8 joules/second. Here we can say that 1.8 watts of power are being transmitted to the motor.
And when we increase the voltage more current will be able to pass through the motor. And hence, more energy will get transferred from the power supply.
The power can be calculated by the voltage * current=power. The watt is the derived unit for the power. In order to understand electricity, first, we need to know about the atom. The atom is a particle that is invisible to the naked eye. Now let us know what the inside of the atom consists of?.
Here, the atoms consist of both the protons and the neutrons. We also have electrons where they will orbit around the nucleus that is present at the center of the atom.
Here these electrons are the main ones responsible for the occurrence of electricity.
Atoms of an element will contain the same number of protons. But it can have a different number of neutrons and a different number of electrons in it.
The electrons are very lighter than the protons that are present in the nucleus. This can easily move.
Here, the moment of the electrons will cause the formation of the electric current. The atom protons will give a positive charge and electrons are the negative charge, all these protons ann electrons will balance each other.
Hence, it gives the charge of 0 due to the same number of protons and electrons. But we can also change the charge of the atom and its energy levels by making it gain or lose the number of electrons.
Here, the atom will have very fewer electrons than that of the protons. When we have a more number of electrons than that of the protons, then we can say that the atom is highly negatively charged and vice versa.
Here, the losing and gaining of electrons will lead to a change in the electric current or electric charge. when we have the same electrons and the protons then we call it neutral.
The energy that takes to move electrons from the circuit is one of the characteristics that is expressed in watts.
See lessRefer To The Exhibit. What Is The Global Ipv6 Address Of The Host In Uncompressed Format?
Refer To The Exhibit. What Is The Global Ipv6 Address Of The Host In Uncompressed Format? Is the global IP address of the host in uncompressed format. Today let us learn about what actually the global address is in detail. The global unicast address has the range 2000::/3. This global unicast addresRead more
Refer To The Exhibit. What Is The Global Ipv6 Address Of The Host In Uncompressed Format?
Is the global IP address of the host in uncompressed format. Today let us learn about what actually the global address is in detail.
The global unicast address has the range 2000::/3. This global unicast address is very unique and also very routable.
It is also called the global IP address which is very similar to the ipv4 address.
This 2000::/3 is mainly an address that is used for the documentation and like education and many sorts of the things.
The global unicast address will begin with either 2 or 3, here the first three bits will be converted into the hexadecimal format.
Now let us know some of the parts of the global unicast address in detail. The global unicast address is simply the 32 bit address. It consists of two parts. They are network portion and the other one is called the host portion.
Here for the subnet portion, we will borrow the space from the host portion.
The creation of the subnetting is a time-consuming process. But In the ipv6, it will be much easier.
Here in the ipv6, it consists of an interface IP which is very equivalent to the host portion of the ipv4 address.
Here it also consists of the routing prefix. this part of the network portion is the same as how the internet service provider sees.
The part of the network portion consists of the subnet I’d. In the IP V6 global unicast address the first 48 bits will be called the global routing prefix.
Here the next 16 bits can be allocated to the subnet I’d.
Another part of the ipv6 global unicast address is called the interface Id. These interface IDs are normally 64 bits.
Here there is a specific reason for the 64 bits size of the interface Id. Here when we want to use the stateless address autoconfiguration. So the host portion of the interface-id will be 64 bits.
And the space between the global routing prefix is the one that we get from the provider and the interface-id will be the subnet I’d.
A lot of the ipv6 addresses will don’t have to be worried about the conserving of the address space.
The first half of the global unicast address will be of network I’d and the next half of the address will be called the interface Id.
Here the network I’d again be divided into parts that are global routing prefixes. This global routing prefix will be assigned bro the internet service provider.
This is the globally unique routing prefix. All the routers around the World will be using this prefix in order to direct the traffic to the network. And the last 16 bits in the network I’d be using as the subnet I’d. Unlike the ipv4 address, we do not need to borrow the interface portion of our address or any of the host portion of the address.
See lessWhat Are Two Advantages Of Static Routing Over Dynamic Routing? (Choose Two.)
What Are Two Advantages Of Static Routing Over Dynamic Routing? (Choose two.) When we compare dynamic routing with static routing, the static routing will be more secure when we compare it with dynamic routing. And also the static routing will be having fewer resources when we compare it with the dyRead more
What Are Two Advantages Of Static Routing Over Dynamic Routing? (Choose two.)
When we compare dynamic routing with static routing, the static routing will be more secure when we compare it with dynamic routing.
And also the static routing will be having fewer resources when we compare it with the dynamic routing. Today, let us learn about the difference between static and dynamic routing along with its advantages and disadvantages in detail.
Before we discuss the types of routing, firstly, let us know the definition of the routing bin detail.
The routing is nothing but a process of creating the route for its data packets. The types of this routing are called static routing and dynamic routing. But what is actually the difference between static and dynamic routing?
Now let us know about it in detail. As we said earlier the routing is like the process of creating a specific path for the transmission of the data packets. This will be present at the network layer of the OSI model.
The first type of routing is called static routing. Now let us know about the static routing in detail. Here the static routing does not contain any type of routing protocol.
Another type of routing is called dynamic routing. This dynamic routing contains the routing protocol, the routing protocols are nothing but the rip, IGRP, IGRP, OSPF, and many more.
When the network administrator manually enters the information in the routing table is called static routing. This static routing will be called one-way communication. And as we said earlier, static routing does not use any routing protocol.
Now let us know how actually this routing protocol works let us know about this in detail. Yo understand this concept in detail, let us take an example. Let say we want to send the data or information from one router to another router, here we create the default route in a way that if any router is present between the sending router and the destination router, the router which is present in between the two routers will send the information to the destination router.
For suppose, due to an unknown reason if router 2 which is present in the middle fails or is unable to send the information to the destination router, then the sending router will not able to decide the alternate routing path for the data packets.
Hence in this type of situation, the network administrator will have to manually configure the alternate route in order to reach the information to the destination router. therefore the main drawback in the Static routing is that it doesn’t contain any alternate route.
But in the dynamic routing, contains some alternate routes in order to send the information to the destination router.
And also the static routing will be a time-consuming process when we compare it with dynamic routing. The user must wait until the network administrator finds another route. The dynamic routing will be less time-consuming when we compare it with the static routing.
See lessWhich Statement Describes A Route That Has Been Learned Dynamically?
Which Statement Describes A Route That Has Been Learned Dynamically? It will be able to update and maintain the routing protocols dynamically. Now let us learn about the static routing default routing and the dynamic routing in detail. The IP protocol will take care of how the packets are destined tRead more
Which Statement Describes A Route That Has Been Learned Dynamically?
It will be able to update and maintain the routing protocols dynamically. Now let us learn about the static routing default routing and the dynamic routing in detail.
The IP protocol will take care of how the packets are destined to the destination address. The IP protocol will be present at layer 3 of the OSI model. This layer 3 is nothing but the network layer.
Here, we will also learn about all the neighboring routers to where or from where the data packets are coming.
In the concept of routing it, we actually learn to find the best path to send to the destination address. The managing and verifying of the routing can also be done in the routing protocol.
Now let us actually learn about the types of routing in detail. There are three types of routing. They are static routing, dynamic routing, and the other one is called the default routing.
Now let us know each of these types of routing in detail.
Firstly, in static routing, the network administrator will add the routing information manually.
Another type of routing is called dynamic routing. In dynamic routing, we use the protocols in order to propagate the routing information. And the last one is the default routing, in the default routing all the routers will configure the information and send all these data packets into the single router.
Now let us actually learn each of these types in detail. As we said earlier the static routing must be written manually by the network administrator.
In order to resolve this problem, we use dynamic routing, this dynamic routing will use the routing protocol, which is mostly used for creating the route for the data packets. Here it will automatically collect the information and store it in the dynamic routing table.
Let us take an example to understand the concept of dynamic routing in detail. Let say we have five routers that are connected to each other. In the dynamic routing protocol, the administrator is not going to create the routing path for the data packets. Unlike the static routing protocol, the network administrator will assign a routing protocol to the router so that it can automatically decide the best routes for the data packets.
The dynamic routing protocol works very efficiently and it can automatically able to choose some other alternate route immediately without the need of the network administrator. Hence we can reduce the work for the network administrator. So that the user does need not wait for a longer time to find the alternate route and no need to wait for the network administrator.
When we compare the dynamic routing to the static routing, the static routing will be more time-consuming than the dynamic routing.
And also if any failure occurs in the middle of the transmission of the data, the dynamic routing protocol does not get affected whereas in the static routing the failure affects the network.
See lessIn Which Cipher Method Are Values Rearranged Within A Block To Create The Ciphertext?
In Which Cipher Method Are Values Rearranged Within A Block To Create The Ciphertext? The permutation cipher method will be used, where the values are rearranged within the block in order to create the ciphertext. Today let us know about the permutation cipher method bin detail. The permutation ciphRead more
In Which Cipher Method Are Values Rearranged Within A Block To Create The Ciphertext?
The permutation cipher method will be used, where the values are rearranged within the block in order to create the ciphertext. Today let us know about the permutation cipher method bin detail.
The permutation cipher is also called the transposition cipher. We can also refer to this with the other name called the transposition cipher. Here it describes in a mathematical way to find what going on the ciphertext side.
The transposition cipher is different from the other two cipher like shift cipher and the substitution cipher.
In the permutation cipher, we don’t actually change the letters that we do as in shift and substitution cipher. Rather we make the letters mute, this means we did not rearrange the letters in the text message.
Let us take an example to understand this concept in detail. Let say a plain text “hello”, the sender wants to send this message to the receiver side who is present far from the sender, now the text message should be encrypted in order to send in a secure manner. Now we encrypt this text message “hello” using the permutation cipher.
Now let us know how this will perform in detail. Before we send the message the sender and receiver must agree to the key, this key is nothing but a path in order to rearrange the letters. But how we are gonna rearrange the letters?
One of the ways to rearrange the letters is we just rearrange the order for the letters in which they are in. This key will help us to rearrange the letters.
Now in the message “hello” we rearrange it to the “LEHOL”. Now, this is called the permutation of the letters. simply we permute the letters of the plain text to make it as the ciphertext.
Now we might have a doubt that how the key will be used in order to permute the letters. For this, we have several different ways in order to perform this.
Every kind of rearranging of the letters will be referred to as a sub cipher.
The change in the order of the characters will be known as the transposition cipher. Let say we have plain text that we need to send to the receiver as “meet me at three pm today at the usual location”.
Now let try to encrypt this kind of message, now the encoded message will be as MTMASC EHTTUA EROTAT TEDHLI AEAELO TPYUON.
Now we write this plain text in the form of
M E E T A T
T H R E E P
M T O D A Y
A T T H E U
S U A L L O
C A T I O N
Now, we encrypt the message by taking all the letters of the columns that are present. and hence the encrypted message will ve mtmasc ehttua erotat tedhli aeaelo tpyuon. We combine the letters in a column way and send them to the receiver.
Which Linux Command Can Be Utilized To Display Your Current Login Name?
Which Linux Command Can Be Utilized To Display Your Current Login Name? The whoami command will be used in order to display the correct login name. Now let us discuss the whoami command in detail. Let us briefly know why do we need this command. We all know that the Linux operating system is like tRead more
Which Linux Command Can Be Utilized To Display Your Current Login Name?
The whoami command will be used in order to display the correct login name. Now let us discuss the whoami command in detail. Let us briefly know why do we need this command.
We all know that the Linux operating system is like the backbone of the internet. The Linux operating system is normally used for entertainment stuff like studies.
If we want to use the Linux operating system, it will be a great start but we need to memorize all the Linux commands that are present in it.
And the command that needs to be memorized is called the whoami. This whoami command will help the users to know and to display the current user name.
The structure to write the commands in a command prompt is $ command -options arguments.
The whoami command will be having two types of options and it doesn’t contain any types of arguments.
This whoami command will be considered as one of the simplest commands. But why this whoami command is considered as the essential command than all? The users who have multiple numbers of the identities, these identities are nothing but the system administrators.
This whoami will be able to provide a quick command for offering an opportunity for self-reflection.
If we want to see how it works practically, now e need to type whoami command on the command prompt, now the computer will display the identity that is given to the computer by simply displaying its name.
This Linux will be able to translate every user to a numeric user id, shortly called the uid.
Now type another command like whoami –help and then press enter. Now we can see the introduction to the advanced command.
We also have another common option like $whoami –version, this will help us to resolve the issues
And the other common command is the exit where it closes the terminal window.
Now we have learned how to use the whoami command and the use of the whoami command. In simple words whenever we forget our identity or if we want to know the identity.
We actually can learn more about ourselves by simply using the whoami command using space. “Who am I”. When we run this command we can able to see some of the additional information.
Like the IP address of the system along with the login time and date. And if we want to know the information about all the users who are currently in login.
We simply type the command $who and press enter now we can see how many users are getting connected will be displayed along with their IP address.
The who command can be made more meaningful when we type the command who -H and then press enter. Now this will display the column header with the name line time and along with their respective IP addresses.
The who -q command will also display how many users are currently logged in along with their names.
See less