what is a protocol in networking

what is a protocol in networking A protocol a standard arrangement of decides that enable electronic gadgets to speak with one another. These principles incorporate what kind of information might be transmitted, what directions are utilized to send and get Read More …

What is the OSI model?

What is the OSI model? The Open Systems Interconnection (OSI) model is a theoretical model made by the International Organization for Standardization which empowers differing correspondence frameworks to convey utilizing standard conventions. In plain English, the OSI gives a standard Read More …

MAC address (Media Access Control address)

MAC address (Media Access Control address) In a local area network (LAN) or other networks, the MAC (Media Access Control) address is your computer’s extraordinary equipment number. (On an Ethernet LAN, it’s equivalent to your Ethernet address.) When you’re associated Read More …

What is the Domain Name System (DNS)?

What is the Domain Name System (DNS)? A DNS server is a kind of name server that oversees, keeps up and forms Internet domain names and their related associated. As such, a DNS server is an essential segment that executes Read More …

What is a DHCP Server?

What is a DHCP Server? A DHCP server is a network server that consequently gives and relegates IP addresses, default entryways and other system parameters to customer gadgets. It depends on the standard convention known as Dynamic Host Configuration Protocol Read More …

How to Configure VLAN in Cisco Packet Tracer Step by Step

How to Configure VLAN in Cisco Packet Tracer Step by Step This instructional exercise discloses how to make and allot VLAN, VLAN Membership (Static and Dynamic), Router on Stick and Spanning Tree Protocol (STP) in detail with down to earth Read More …

Cisco switch basic configuration

Basic Cisco Switch Configuration As I would see it, the Cisco switches are the best in the market. Adaptable, solid, adaptable and ground-breaking, the Cisco switch product offering, (for example, 2960, 3560, 3650, 3850, 4500, 6500, 9400 arrangement and so Read More …

How to Secure your Cisco Router with Passwords

How to Secure your Cisco Router with Passwords For what reason do you have to protect your switch with passwords? The inquiry you may pose is: Doesn’t the switch as of now have default passwords? The appropriate response is NO, Read More …

The most effective method to Transfer Photos to an External Hard Drive

The most effective method to Transfer Photos to an External Hard Drive External hard drives are physical storage devices that can hold digital information in the form of files. Digital photograph files are often stored on external hard drives as Read More …

What Do Attributes for Read-Only or Hidden Mean?

What Do Attributes for Read-Only or Hidden Mean? “Read-only” and “hidden” are attributes that users of Windows operating systems can add to a document. Setting a document as read-just or covered up doesn’t change the substance of the record. Or Read More …

Step by step instructions to Unhide Folders and Files on XP

Step by step instructions to Unhide Folders and Files on XP The Windows XP¬†operating system and all variants of the Windows working frameworks since Windows 95 conceal framework organizers and inclinations that clients once in a while would look for. Read More …

Step by step instructions to Turn Off Permission Inheritance

Step by step instructions to Turn Off Permission Inheritance Windows operating systems use special permissions to control who approaches certain records and organizers. By and large, Windows allocates the consents to a record dependent on its parent organizer, with the Read More …

Step by step instructions to Delete a User from My Computer

Step by step instructions to Delete a User from My Computer When you create a new user account in Windows, a similarly named folder is also created on your local hard drive. Erasing latent client profiles and their client organizers Read More …

Instructions to Change Read Only Files or Folders

Instructions to Change Read Only Files or Folders Removing read-only permissions on a file or folder on your Windows 8.1 PC is a two-arrange process. In the first place, before you can change the authorizations themselves, you should take responsibility Read More …

Step by step instructions to Password Protect a Shared Folder

Step by step instructions to Password Protect a Shared Folder A shared folder on your computer allows other individuals on your system to get to basic records. On the off chance that you need to confine others from getting to Read More …

Step by step instructions to Password Protect Folders

Step by step instructions to Password Protect Folders Sharing a computer with other people can be an issue, particularly when you have documents and organizers that you don’t need others to see. You can’t utilize a secret word to secure Read More …

Step by step instructions to Give Permissions to a Shared Drive

Step by step instructions to Give Permissions to a Shared Drive Shared folders allow users to read and edit files on a system hard drive situated on another PC. Appointing consents is significant if a portion of the mutual envelopes Read More …

The most effective method to Create a Shared Folder

The most effective method to Create a Shared Folder Windows incorporates two strategies to share organizers on a system. HomeGroup, a straightforward technique for setting up sharing, works not just with the Videos and different libraries offered during HomeGroup arrangement, Read More …

The most effective method to Transfer Files With a Crossover Cable

The most effective method to Transfer Files With a Crossover Cable Use a crossover cable to easily transfer files between two computers. Crossover cables allow two computers to make their very own, wired system to share documents and organizers. Everyonecomputer Read More …

Step by step instructions to Connect a Pixma Mx310 Printer to a Wireless Network

Step by step instructions to Connect a Pixma Mx310 Printer to a Wireless Network Sharing your Pixma MX310 printer over your remote system will spare you time and bother, as you will have the option to print from each PC Read More …

The most effective method to Connect One Printer to Two Computers

The most effective method to Connect One Printer to Two Computers Sharing computer assets just bodes well. In particular, sharing a printer between at least two computers is something that an ever-increasing number of individuals need to do at home Read More …

Instructions to Connect a Computer to Another Computer

Instructions to Connect a Computer to Another Computer This article is for individuals who need to share documents between at least two PCs or offer a hard drive or printer. The procedure is genuinely straightforward and should be possible with Read More …

Why Is the Wireless Light Just Blinking?

Why Is the Wireless Light Just Blinking? At the point when a remote switch’s light continues squinting and you can utilize it to get to the Web, it implies the gadget is working appropriately. In any case, if squinting is Read More …

The most effective method to Change the Password on a Cisco Linksys Router

The most effective method to Change the Password on a Cisco Linksys Router Linksys (presently part of Cisco Systems) is a maker of systems administration hardware. At the point when a Linksys switch is designed with a secret phrase, all Read More …

Step by step instructions to Relocate a FiOS Ethernet Router

Step by step instructions to Relocate a FiOS Ethernet Router A Verizon FiOS client’s switch connects to the system by means of RG6 coaxial link connected to the Verizon link divider outlet. To migrate a Verizon FiOS router, use enough Read More …