Archive
What is an Access control List (ACL)? What does it do? Why do you need to configure an ACL? What are Access Control entries? Who is a trustee? What are the types of ACL in use and in which circumstances are they used? Where in the network, should you configure an ACL?
Read moreWhat is a Internet Protocol Version 6 address (IPv6 address)? How is it different from an IPv4 address? What are the benefits of IPv6 addressing? What are the different IPv6 classes? What is their difference in functioning? What is an IPv6 address scope? How are IPv6 addresses denoted? What is Mobile IPv6? What is its need?
Read moreWhat is Lightweight Directory Access Protocol (LDAP)? Which is the latest version in use ? What is it also known as? Where is LDAP commonly used ?How is a LDAP session started by a client?How is a directory different from a database ?How is LDAP different from the commonly used X500 standard
Read moreWith reference to MS Office , how can the use of Styles make your document look more professional ? What are the formatting characteristics that Styles can be applied for?What is direct Formatting and where is it used ? Why is it recommended to use Styles instead of direct formatting?What are Quick styles used for?
Read moreWhat is a Storage Area Network? Name some hardware components in SAN? What are the benefits of Storage Area networks to an organization? What is a Direct Attached Storage? How is a SAN better in performance than a DAS? Why are some companies still using DAS? What is the preferred communication protocol used in SAN?
Read moreSymmetric encryption is faster but difficult to implement. Explain why? What is it also known as ?How does it work ?What is asymmetric encryption? What is its alternate name? What is its disadvantage? Explain the process of asymmetric encryption? What is the use of digital certificates in the process of asymmetric encryption?
Read moreWhat is an IP address? What is a private IP address? How can you access a private IP? In which circumstances do you need a private IP to be configured? What is a public IP? How can you access a public IP? Which are the organizations responsible for registering a public IP address?
Read moreMajor mobile phone operating systems like Android and iOS are designed structurally different. This causes major issues to developers developing apps for mobile phones? Is it then possible for apps to run on all phones regardless of its Operating System? What is the best way for developers to develop app without requiring it to be tweaked to meet the needs of different Operating Systems?
Read moreWent I go onto the internet to download files or applications, I sometimes come across zip folders which contain the application I am after. Usually, I do not know how to build the files so I tend to ignore zip folders in general and go for self-extracting files. I need someone to help me understand what handle zip folders are and why files are store in them?
Read moreI have a lot of old emails in my outlook email account. I need to delete some of these old emails but I do not want to waste too much time deleting them one at a time. How can I adjust the settings to specify a particular period for the emails to be deleted automatically? I would also like a message to be sent to me stating the intended action? How can I get this information sent to my phone before confirming yes or no to the request
Read more