Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In
Continue with Google
or use


Have an account? Sign In Now

Sign In

Continue with Google
or use

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Network Classmate Logo Network Classmate Logo
Sign InSign Up

Network Classmate

Network Classmate Navigation

  • Home
  • Article
  • Q&A
  • Guest Post
Search
Ask A Question

Mobile menu

Close
  • Home
  • Feed
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges

Q & A

Share
  • Facebook
1 Follower
15k Answers
15k Questions
Home/Q & A/Page 197
  • Recent Questions
  • Most Answered
  • Answers
  • No Answers
  • Most Visited
  • Most Voted
  • Random
  1. Asked: December 28, 2022In: Q & A

    How To Configure Extended Access List?

    Yepuri Kalyani
    Yepuri Kalyani Bronze
    Added an answer on December 29, 2022 at 5:57 pm

    1. Log into the router. 2. Enter the configuration mode. 3. Enter the command “access-list [number] [permit/deny] [source] [destination]” where [number] is the number of the extended access list, [permit/deny] is the action to take on the specified source/destination, [source] is the source addressRead more

    1. Log into the router.

    2. Enter the configuration mode.

    3. Enter the command “access-list [number] [permit/deny] [source] [destination]” where [number] is the number of the extended access list, [permit/deny] is the action to take on the specified source/destination, [source] is the source address of the packet, and [destination] is the destination address of the packet.

    4. Repeat step 3 for each rule you want to add to the access list.

    5. Enter the command “exit” to save the configuration.

    6. Enter the command “show access-lists [number]” to view the access list.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  2. Asked: December 28, 2022In: Q & A

    How To Open a Port In Symantec Endpoint Protection 14?

    Yepuri Kalyani
    Yepuri Kalyani Bronze
    Added an answer on December 29, 2022 at 5:57 pm

      1. Open the Symantec Endpoint Protection Manager console. 2. Click the Policies tab. 3. Select the policy that you want to modify and click Edit. 4. Expand the Firewall policy and select Firewall Settings. 5. Select the Ports and Protocols tab. 6. Click the Add button and enter the port numbeRead more

     

    1. Open the Symantec Endpoint Protection Manager console.
    2. Click the Policies tab.
    3. Select the policy that you want to modify and click Edit.
    4. Expand the Firewall policy and select Firewall Settings.
    5. Select the Ports and Protocols tab.
    6. Click the Add button and enter the port number, protocol, and action you want to take.
    7. Click the OK button to save your changes.
    8. Click the Save button to save the policy.
    9. Right-click the policy you just modified and select Deploy.
    10. Select the clients you want to deploy the policy to and click OK.
    11. Click the Close button to close the window.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  3. Asked: December 28, 2022In: Q & A

    How To Fix My Hacked Email Account?

    Yepuri Kalyani
    Yepuri Kalyani Bronze
    Added an answer on December 29, 2022 at 5:56 pm

      1. Change your password - The first and most important thing to do if your email account has been hacked is to change your password. You should make sure to choose a strong, unique password that is not easily guessed. 2. Check for suspicious activity - After changing your password, you shouldRead more

     

    1. Change your password – The first and most important thing to do if your email account has been hacked is to change your password. You should make sure to choose a strong, unique password that is not easily guessed.

    2. Check for suspicious activity – After changing your password, you should check your account for any suspicious activity. Look for emails or files that you don’t recognize, or check your sent mail folder for emails that you didn’t send.

    3. Enable two-factor authentication – If your email provider offers two-factor authentication, be sure to enable it. This will add an extra layer of security to your account and make it more difficult for attackers to gain access.

    4. Contact your email provider – If you suspect that your account has been hacked, contact your email provider immediately. They may be able to provide additional security measures or help you recover your account.

    5. Scan your computer for malware – If your email account was hacked, it’s possible that your computer is infected with malware. Run a scan with an anti-virus program to make sure that your system is clean.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  4. Asked: December 28, 2022In: Q & A

    How To Remove Macros From Excel?

    Yepuri Kalyani
    Yepuri Kalyani Bronze
    Added an answer on December 29, 2022 at 5:55 pm

    1. Open your Excel document and click the "Developer" tab. 2. Select "Visual Basic" in the Developer tab. 3. In the Visual Basic window, select "Modules" in the Project Explorer window. 4. Right-click the module that contains the macro you want to delete and select "Remove Module" from the drop-downRead more

    1. Open your Excel document and click the “Developer” tab.
    2. Select “Visual Basic” in the Developer tab.
    3. In the Visual Basic window, select “Modules” in the Project Explorer window.
    4. Right-click the module that contains the macro you want to delete and select “Remove Module” from the drop-down menu.
    5. Click the “Yes” button in the pop-up window to confirm your selection.
    6. Close the Visual Basic window and save your document. The macro will no longer be available in the Excel file.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  5. Asked: December 28, 2022In: Q & A

    How To Put 2 Routers On The Same Network?

    Yepuri Kalyani
    Yepuri Kalyani Bronze
    Added an answer on December 29, 2022 at 5:54 pm

      1. Start by connecting each router to the same modem or internet connection. 2. Configure the primary router with basic settings such as an IP address, subnet mask, and default gateway. 3. Set up the secondary router with a different IP address, but the same subnet mask and default gateway asRead more

     

    1. Start by connecting each router to the same modem or internet connection.

    2. Configure the primary router with basic settings such as an IP address, subnet mask, and default gateway.

    3. Set up the secondary router with a different IP address, but the same subnet mask and default gateway as the primary router.

    4. Connect both routers with an Ethernet cable, linking their LAN ports together.

    5. Configure the secondary router to act as a “bridge” or “wireless access point” by disabling its DHCP server and enabling the “Bridge Mode” or “Access Point” feature.

    6. Configure the wireless security settings on the secondary router to match the settings of the primary router.

    7. Reboot both routers and test the connection.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  6. Asked: December 28, 2022In: Q & A

    How To Start Jboss Server In Windows?

    Yepuri Kalyani
    Yepuri Kalyani Bronze
    Added an answer on December 29, 2022 at 5:53 pm

    1. Download and install the Java Development Kit (JDK) from the official Oracle website. 2. Download and install the JBoss Application Server from the official JBoss website. 3. Create a JBoss user to run the server. 4. Open a command prompt and navigate to the bin folder of the JBoss installation dRead more

    1. Download and install the Java Development Kit (JDK) from the official Oracle website.

    2. Download and install the JBoss Application Server from the official JBoss website.

    3. Create a JBoss user to run the server.

    4. Open a command prompt and navigate to the bin folder of the JBoss installation directory.

    5. Run the standalone.bat script to start the server.

    6. You can now access the server at localhost:8080.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  7. Asked: December 29, 2022In: Q & A

    How To Join Server 2019 To Domain?

    Yepuri Kalyani
    Yepuri Kalyani Bronze
    Added an answer on December 29, 2022 at 5:53 pm

    1. Open Server Manager by clicking the Server Manager icon on the desktop or by clicking Start > All Programs > Administrative Tools > Server Manager. 2. Select Local Server from the left pane. 3. In the middle pane, click the link that says “WORKGROUP”. 4. In the System Properties window,Read more

    1. Open Server Manager by clicking the Server Manager icon on the desktop or by clicking Start > All Programs > Administrative Tools > Server Manager.

    2. Select Local Server from the left pane.

    3. In the middle pane, click the link that says “WORKGROUP”.

    4. In the System Properties window, click the “Change” button next to “Computer Name”.

    5. In the Computer Name/Domain Changes window, select the “Domain” radio button and enter the name of the domain you wish to join.

    6. Click OK.

    7. Enter the domain username and password of an account with permissions to join the domain.

    8. Click OK.

    9. Wait for the server to restart and then log back in using the domain credentials.

    10. Verify that the server is joined to the domain by opening Server Manager and selecting the “All Servers” option from the left pane. The domain should now be listed in the “Domain” column.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  8. Asked: December 29, 2022In: Q & A

    What Is Amazon Cloud Services?

    Yepuri Kalyani
    Yepuri Kalyani Bronze
    Added an answer on December 29, 2022 at 5:52 pm

    Amazon Cloud Services (also known as Amazon Web Services) are a suite of cloud computing services that are offered by Amazon. They include Amazon Elastic Compute Cloud (EC2), Amazon Simple Storage Service (S3), Amazon Relational Database Service (RDS), Amazon Elastic Block Store (EBS), Amazon CloudFRead more

    Amazon Cloud Services (also known as Amazon Web Services) are a suite of cloud computing services that are offered by Amazon. They include Amazon Elastic Compute Cloud (EC2), Amazon Simple Storage Service (S3), Amazon Relational Database Service (RDS), Amazon Elastic Block Store (EBS), Amazon CloudFront, Amazon Simple Queue Service (SQS), and Amazon Route 53. These services enable businesses and developers to build, deploy, and scale their applications and websites on the Amazon Web Services platform.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  9. Asked: December 29, 2022In: Q & A

    What Is Network Latency?

    Yepuri Kalyani
    Yepuri Kalyani Bronze
    Added an answer on December 29, 2022 at 5:52 pm

    Network latency is the time it takes for a packet of data to travel from its source to its destination across a network. It is usually measured in milliseconds (ms), which is a thousandth of a second. Network latency can be affected by many factors including the type of network, the geographical disRead more

    Network latency is the time it takes for a packet of data to travel from its source to its destination across a network. It is usually measured in milliseconds (ms), which is a thousandth of a second. Network latency can be affected by many factors including the type of network, the geographical distance between the source and destination, and the amount of traffic on the network.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  10. Asked: December 29, 2022In: Q & A

    What Is Bridge Computer?

    Yepuri Kalyani
    Yepuri Kalyani Bronze
    Added an answer on December 29, 2022 at 5:51 pm

    Bridge computer is a device that connects two networks together, allowing them to communicate and share resources. It acts as a bridge between two or more networks, providing a pathway for data to travel between them. Bridge computers are used in wide area networks (WANs) to connect different LANs aRead more

    Bridge computer is a device that connects two networks together, allowing them to communicate and share resources. It acts as a bridge between two or more networks, providing a pathway for data to travel between them. Bridge computers are used in wide area networks (WANs) to connect different LANs and allow them to access the same resources.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
Load More Answers

Sidebar

Top Members

Shailendra Yadav

Shailendra Yadav

  • 2k Questions
  • 52k Points
Level 50
Sneha Singh

Sneha Singh

  • 2k Questions
  • 41k Points
Level 40
Nilay Sharma

Nilay Sharma

  • 0 Questions
  • 33k Points
Level 30
  • Popular
  • Comments
  • Farwa Khalid

    Half Duplex Versus Full Duplex

    • 3 Comments
  • Farwa Khalid

    What Is Wireless Isolation?

    • 0 Comments
  • Farwa Khalid

    What Is Ping Spoofing

    • 0 Comments
  • Farwa Khalid

    What Is Radio Network Controller?

    • 0 Comments
  • Farwa Khalid

    What Is A Typical Symptom Of A CMOS Battery Failure?

    • 0 Comments
  • What is Circuit Switching - Network Classmate
    What is Circuit Switching - Network Classmate added a comment […] needs to be established. It is additive into two… November 30, 2022 at 11:36 am
  • Difference Between Router And Switch - Network Classmate
    Difference Between Router And Switch - Network Classmate added a comment […] router works in the full-duplex transmission mode. However, we… November 30, 2022 at 11:36 am
  • Communication Protocols - Network Classmate
    Communication Protocols - Network Classmate added a comment […] receiver. It is two wired protocols. Rx and Tx… November 30, 2022 at 11:35 am

  • Home
  • Groups page
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Communities
  • Polls
  • Tags
  • Badges




Footer

Important Links

  • Home
  • Article
  • Q&A
  • Guest Post

Useful Categories

  • Basic Networking
  • Basic Security
  • CCNA R & S
  • CCNA Security
  • Download

Legal Stuff

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • User Data Policy

Social Links

  • Facebook
  • Instagram
  • Twitter
  • Telegram
  • Linkedin

Copyrights © 2023 Network Classmate™. All Rights Reserved.
Designed by LeadsNut