Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In
Continue with Google
or use


Have an account? Sign In Now

Sign In

Continue with Google
or use

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Network Classmate Logo Network Classmate Logo
Sign InSign Up

Network Classmate

Network Classmate Navigation

  • Home
  • Article
  • Q&A
  • Guest Post
Search
Ask A Question

Mobile menu

Close
  • Home
  • Feed
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges

Yepuri Kalyani

Bronze
Ask Yepuri Kalyani
107 Visits
0 Followers
0 Questions
Home/ Yepuri Kalyani/Answers
  • About
  • Questions
  • Polls
  • Answers
  • Best Answers
  • Asked Questions
  • Followed
  • Favorites
  • Groups
  • Posts
  • Comments
  • Followers Questions
  • Followers Answers
  • Followers Posts
  • Followers Comments
  1. Asked: December 21, 2022In: Q & A

    How To Set Environment Variables In Linux?

    Yepuri Kalyani
    Yepuri Kalyani Bronze
    Added an answer on December 31, 2022 at 2:10 pm

      To set environment variables in Linux, open the terminal and type the following command: export VARIABLE_NAME=value where VARIABLE_NAME is the name of the environment variable and value is the value to be assigned to it. For example, if you want to set the environment variable PATH, you wouldRead more

     

    To set environment variables in Linux, open the terminal and type the following command:

    export VARIABLE_NAME=value

    where VARIABLE_NAME is the name of the environment variable and value is the value to be assigned to it.

    For example, if you want to set the environment variable PATH, you would type the following command:

    export PATH=/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin

    You can also use the command line to set multiple environment variables at once. To do so, you would type:

    export VARIABLE_NAME_1=value_1 VARIABLE_NAME_2=value_2 VARIABLE_NAME_3=value_3

    You can also set environment variables permanently in Linux by adding them to the .bashrc file in your home directory. To do so, open the .bashrc file in a text editor and add the following line:

    export VARIABLE_NAME=value

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  2. Asked: December 21, 2022In: Q & A

    How To Know If Someone Hacked My Google Account?

    Yepuri Kalyani
    Yepuri Kalyani Bronze
    Added an answer on December 31, 2022 at 2:09 pm

    If you suspect your Google account has been hacked, the first thing you should do is change your password immediately. You should also review your recent activity to check if there are any suspicious logins or changes. You can do this by going to the Google Account Security Checkup page. AdditionallRead more

    If you suspect your Google account has been hacked, the first thing you should do is change your password immediately. You should also review your recent activity to check if there are any suspicious logins or changes. You can do this by going to the Google Account Security Checkup page. Additionally, you can check recent activity from the Google Account Home page to see if any devices or locations that aren’t familiar to you have accessed your account. Lastly, you can turn on two-factor authentication for an extra layer of security.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  3. Asked: December 21, 2022In: Q & A

    How To Set Up a Business Network?

    Yepuri Kalyani
    Yepuri Kalyani Bronze
    Added an answer on December 31, 2022 at 2:08 pm

    1. Establish Your Network Requirements: Before setting up a business network, you need to determine your exact requirements. Consider the size of the network, the number of users, the type of applications you will use and the type of hardware you will need. 2. Choose Your Hardware: The hardware youRead more

    1. Establish Your Network Requirements:
    Before setting up a business network, you need to determine your exact requirements. Consider the size of the network, the number of users, the type of applications you will use and the type of hardware you will need.

    2. Choose Your Hardware:
    The hardware you choose will depend on your requirements. Consider the type of server, the type of router and switch, the type of firewall and the type of cabling you will need.

    3. Install the Hardware:
    Once you have chosen the hardware you need, you can start installing it. This may require specialized knowledge and experience, so consider hiring a professional to do the work for you.

    4. Set Up Your Network:
    Once all the hardware is installed, you can now set up the network. This includes configuring the server, the router, the switch, the firewall and the cabling.

    5. Configure User Accounts and Permissions:
    Once the hardware is set up and the network is running, you need to set up user accounts and configure user permissions. This includes defining user roles, granting access to files and applications and setting up passwords.

    6. Install Network Applications:
    Once the users are set up, install any network applications you need. This includes setting up email and collaboration tools, database applications and other business applications.

    7. Monitor and Maintain the Network:
    Once the network is up and running, you need to monitor it and make sure it is running optimally. This may include regular maintenance and software updates, as well as troubleshooting any issues that may arise.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  4. Asked: December 21, 2022In: Q & A

    How To Find Out If Someone Hacked My Email?

    Yepuri Kalyani
    Yepuri Kalyani Bronze
    Added an answer on December 31, 2022 at 2:08 pm

    If you think that your email has been hacked, there are a few steps you can take to determine if this is true. The first is to check your email account settings to see if any changes have been made. Additionally, you can run a scan of your computer to see if any malicious software has been installedRead more

    If you think that your email has been hacked, there are a few steps you can take to determine if this is true. The first is to check your email account settings to see if any changes have been made. Additionally, you can run a scan of your computer to see if any malicious software has been installed. Finally, you can check your email account activity log to see if any unauthorized logins or suspicious activity have been detected. If any of these steps show that your email has been hacked, it is important to contact your email provider or the police as soon as possible.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  5. Asked: December 21, 2022In: Q & A

    How To Check Open File Sessions On Server 2012?

    Yepuri Kalyani
    Yepuri Kalyani Bronze
    Added an answer on December 31, 2022 at 2:07 pm

    1. Open the Task Manager. 2. Click the Performance tab. 3. Click the Open Files tab. 4. Select the User or Computer field to view all open files by user or computer. 5. Select the File Path field to view open files by location. 6. Select the User or Computer field to view open file sessions by userRead more

    1. Open the Task Manager.

    2. Click the Performance tab.

    3. Click the Open Files tab.

    4. Select the User or Computer field to view all open files by user or computer.

    5. Select the File Path field to view open files by location.

    6. Select the User or Computer field to view open file sessions by user or computer.

    7. Select the Activity field to view the process, application, or service associated with the open file session.

    8. Select the Date/Time field to view the date and time when the open file session began.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  6. Asked: December 21, 2022In: Q & A

    How To Tell If My Yahoo Email Has Been Hacked?

    Yepuri Kalyani
    Yepuri Kalyani Bronze
    Added an answer on December 31, 2022 at 2:07 pm

    If you suspect that your Yahoo email account has been hacked, there are a few steps you can take to check. 1. Check the Yahoo account activity page. Visit the Yahoo Account Activity page and look for any suspicious activity. This page will show you any recent logins and other activity associated witRead more

    If you suspect that your Yahoo email account has been hacked, there are a few steps you can take to check.

    1. Check the Yahoo account activity page. Visit the Yahoo Account Activity page and look for any suspicious activity. This page will show you any recent logins and other activity associated with your account.

    2. Check your Yahoo account settings. Visit the Yahoo Account Settings page to make sure that all of your account settings are still the same. If any changes have been made, you may have been hacked.

    3. Check your Yahoo contacts list. If you notice any new contacts in your Yahoo Contacts list, it could be a sign that someone has hacked your account.

    4. Check your Yahoo emails. If you have received any emails from unfamiliar addresses or with suspicious content, it could be a sign that your account has been hacked.

    5. Change your Yahoo password. If you think your account has been compromised, you should immediately change your password. Make sure to use a strong, unique password that you don’t use for any other accounts.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  7. Asked: December 21, 2022In: Q & A

    How To Convert Number Into Binary?

    Yepuri Kalyani
    Yepuri Kalyani Bronze
    Added an answer on December 31, 2022 at 2:06 pm

      To convert a number into binary, you can use the following steps: 1. Divide the number by two. 2. Get the integer quotient for the next iteration. 3. Get the remainder for the binary digit. 4. Repeat the steps until the quotient is equal to 0. 5. The binary digits obtained in the remainders wRead more

     

    To convert a number into binary, you can use the following steps:

    1. Divide the number by two.
    2. Get the integer quotient for the next iteration.
    3. Get the remainder for the binary digit.
    4. Repeat the steps until the quotient is equal to 0.
    5. The binary digits obtained in the remainders will be in the reverse order of the actual binary number.

    For example, if you want to convert the number 25 into binary, you can follow the steps given below.

    Step 1: 25/2 = 12 (Quotient) 1 (Remainder)
    Step 2: 12/2 = 6 (Quotient) 0 (Remainder)
    Step 3: 6/2 = 3 (Quotient) 0 (Remainder)
    Step 4: 3/2 = 1 (Quotient) 1 (Remainder)
    Step 5: 1/2 = 0 (Quotient) 1 (Remainder)

    Therefore, the binary representation of 25 is 11001.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  8. Asked: December 21, 2022In: Q & A

    What Is Dynamic Ip Address?

    Yepuri Kalyani
    Yepuri Kalyani Bronze
    Added an answer on December 31, 2022 at 2:05 pm

    Dynamic IP address is an IP address that is assigned to a device or computer by a network server each time the device or computer connects to the network. This type of IP address is not static, meaning that it can change with each new connection to the network.

    Dynamic IP address is an IP address that is assigned to a device or computer by a network server each time the device or computer connects to the network. This type of IP address is not static, meaning that it can change with each new connection to the network.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  9. Asked: December 21, 2022In: Q & A

    What Statement Best Describes Operating Systems?

    Yepuri Kalyani
    Yepuri Kalyani Bronze
    Added an answer on December 31, 2022 at 2:05 pm

    An operating system is a collection of software that manages the hardware and software resources of a computer and provides common services for computer programs.

    An operating system is a collection of software that manages the hardware and software resources of a computer and provides common services for computer programs.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  10. Asked: December 21, 2022In: Q & A

    How To Make Wifi Open Network?

    Yepuri Kalyani
    Yepuri Kalyani Bronze
    Added an answer on December 31, 2022 at 2:04 pm

      1. Open your router settings page. This can usually be accessed by typing the IP address of your router into your web browser. 2. Find the section labeled “Wireless Settings” or “Wireless Security” and look for the option to enable an open network. 3. Enter the name of the network in the boxRead more

     

    1. Open your router settings page. This can usually be accessed by typing the IP address of your router into your web browser.

    2. Find the section labeled “Wireless Settings” or “Wireless Security” and look for the option to enable an open network.

    3. Enter the name of the network in the box labeled “SSID”. This is the name that will be visible to other wireless devices in the area.

    4. Set the security type to “None” or “Open”.

    5. Save your settings and reboot the router.

    Your network should now be open and visible to other wireless devices.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
1 … 91 92 93 94 95 … 598

Sidebar

Top Members

Shailendra Yadav

Shailendra Yadav

  • 2k Questions
  • 52k Points
Level 50
Sneha Singh

Sneha Singh

  • 2k Questions
  • 41k Points
Level 40
Nilay Sharma

Nilay Sharma

  • 0 Questions
  • 33k Points
Level 30
  • Popular
  • Comments
  • Farwa Khalid

    Half Duplex Versus Full Duplex

    • 3 Comments
  • Farwa Khalid

    What Is Wireless Isolation?

    • 0 Comments
  • Farwa Khalid

    What Is Ping Spoofing

    • 0 Comments
  • Farwa Khalid

    What Is Radio Network Controller?

    • 0 Comments
  • Farwa Khalid

    What Is A Typical Symptom Of A CMOS Battery Failure?

    • 0 Comments
  • What is Circuit Switching - Network Classmate
    What is Circuit Switching - Network Classmate added a comment […] needs to be established. It is additive into two… November 30, 2022 at 11:36 am
  • Difference Between Router And Switch - Network Classmate
    Difference Between Router And Switch - Network Classmate added a comment […] router works in the full-duplex transmission mode. However, we… November 30, 2022 at 11:36 am
  • Communication Protocols - Network Classmate
    Communication Protocols - Network Classmate added a comment […] receiver. It is two wired protocols. Rx and Tx… November 30, 2022 at 11:35 am

  • Home
  • Groups page
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Communities
  • Polls
  • Tags
  • Badges




Footer

Important Links

  • Home
  • Article
  • Q&A
  • Guest Post

Useful Categories

  • Basic Networking
  • Basic Security
  • CCNA R & S
  • CCNA Security
  • Download

Legal Stuff

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • User Data Policy

Social Links

  • Facebook
  • Instagram
  • Twitter
  • Telegram
  • Linkedin

Copyrights © 2023 Network Classmate™. All Rights Reserved.
Designed by LeadsNut