answersLogoWhite

0

Hello Kinjal khamar, I really appreciate your effort to find answers on wiki answer, and do not work hard to solve this questions. I hope, you should understand wht i mean? Dont put all your questions here. Try to solve these questions, and work hard. Dont disturb every one, and next time If i see you here, i will block your account. Dont take it personally. Take it seriously. Thanks,

Wiki answer team.

User Avatar

Wiki User

17y ago

What else can I help you with?

Related Questions

What did Avogadro's number prove?

no prove....


What is the purpose of the network security authentication function?

To require users to prove who they are


Is the process that requires a user to prove he or she has permission to access a computer network?

Authentication.


How do you prove that a number is a composite?

To prove whether a number is composite, factor it. A number having any factor besides 1 and itself is composite.


What is one of the disadvantages of a peer-to-peer network compared to a server-based network?

With a peer to peer network, in order to access computers resources, all systems must be turned on and running. If one system goes down so does the entire connection. Where as with a server based network the connection will be up and running all the time regardless of how many computers are on. A server based network may prove more conventional for a larger network and may prove more reliable.


What is one of the disadvantages of a server-based network compared to a peer-to-peer network?

With a peer to peer network, in order to access computers resources, all systems must be turned on and running. If one system goes down so does the entire connection. Where as with a server based network the connection will be up and running all the time regardless of how many computers are on. A server based network may prove more conventional for a larger network and may prove more reliable.


List 3 ways to prove network functionality?

Command line utilities, (PING, IPCONFIG, TRACE) Microsoft Network Connections Utility


Which AAA process requires users to prove their identity with a username and password to gain access to a network?

authentication


What did the burial artifacts found in Harlan mound site prove?

Mound Builders had a very extensive trade network


Who was done theories to prove infinity is a number?

No one because infinity is not a number.


How do you prove a number is divisible by 40 and 4?

4


What are the 2 network tools that will help prove network functionality?

Use a command window to run ipconfig /allthen run ping "ipaddress" from the listings.ping 127.0.0.1 is a loopback to test media(Cabling/hubs).