Archive
What is an Intrusion detection system? What are the different types of Intrusion detection systems available? How does each of these work to protect network security? What are the basic variants that are integral to both systems? Where in the network are anti threat devices employed in each of these systems?
Read moreWhat is a footnote or an end note? What purpose does it help to achieve in a Word document? How can a footnote be inserted in a Word document? How can a footnote be deleted from a Word document? How do I move a footnote from one location to another in the document?
Read moreWhat is versioning in MS word? Explain the feature and what is it used for? How can you activate the versioning option? Is versioning available in MS Word 2007? How is the version feature available in Word 2010 different from the versioning feature available in the earlier Word Releases.How can you manage auto saved versions?
Read moreWhat is data independence? How is it used to protect the database from changes? What are the two types of data independence? Mention the differences in these two types of approaches. Which of these types is more difficult to achieve? What is a view? How does a view help in achieving logical data independence?
Read moreHow does webmail and email client differ in the way they function? What is the difference between the Post Office Protocol (POP3) and the Internet Message Access Protocol (IMAP) Mail Server? What is the difference in the way, each of these works? What are the benefits of IMAP? What are its drawbacks?
Read moreWhat is Address Resolution Protocol (ARP)? What is Reverse Address resolution protocol (RARP)? What is the difference between these two protocols? How does each of these work? Where are these protocols used? What are the drawbacks of RARP? What is the Internet Control Message Protocol (ICMP)? What is it used for?
Read moreA company runs across multiple locations and would like to set up a Virtual Private Network between too many branches. With reference to the statement explain what is a VPN? How can the above scenario be achieved? What are the benefits of such a network being created?What is a VPN concentrator ?
Read moreI really love using the Swiftkey in case of Android, when it comes in case of iOS I am not really happy with it. I have also tried stock keyboard for a while but its predictive text is not as good as what I am used to. Few of my friends suggest me Swype. Can anyone suggest me the best keyboard for iOS?
Read moreI installed Yosemite and I got a pop up immediately stating that I need to install Java Runtime. Then I clicked the “More Info” button which opened a Oracle site asking me to download Java 8u25 instead of Java 6 or Java 7. But even after installing Java JRE 8u25, I am not able to get rid of this annoying pop ups till now. Can anyone help me please?
Read moreI love using Apple devices and I currently have several Apple devices with me. Some of them are too old and I am thinking of upgrading them to a newer device or for a hardware upgrade. I currently have iMac 27" Mid 2011, 8GB RAM (with Yosemite), MacBook Pro 13" Early 2011, 4GB RAM (for my regular use), iPhone 5, 16 GB, AT&T (with 2 years contract with AT& T) and iPad First Generation, 16 GB, WIFI. I request for your feedback on upgrading my devices.
Read more