Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In


Have an account? Sign In Now

Sign In

Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.

Sign Up Here


Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Please type your username.

Please type your E-Mail.

Please choose an appropriate title for the question so it can be answered easily.

Please choose the appropriate section so the question can be searched easily.

Please choose suitable Keywords Ex: question, poll.

Browse
Type the description thoroughly and in details.

Choose from here the video type.

Put Video ID here: https://www.youtube.com/watch?v=sdUUx5FdySs Ex: "sdUUx5FdySs".


Ask Soren a question

Please type your username.

Please type your E-Mail.

Please choose an appropriate title for the question so it can be answered easily.

Type the description thoroughly and in details.


Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Sign InSign Up

Search infos

Search infos Logo Search infos Logo

Search infos Navigation

  • Home
  • About Us
  • Blog
  • Contact Us
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Terms Of Use
  • Privacy Policy

Soren

Pundit
Ask Soren
28 Visits
0 Followers
9 Questions
Home/ Soren/Answers
  • About
    1. Asked: August 31, 2022In: Programming languages

      At which layer of the OSI model would a logical address be added during encapsulation?

      Soren Pundit
      Added an answer on August 31, 2022 at 8:23 pm

      The answer is: Network layer In addition, here are the basic functionalities of the network layer: Switching and routing technologies work here Creates logical paths between two hosts across the world wide web called as virtual circuits Routes the data packet to destination Routing and forwarding ofRead more

      The answer is: Network layer

      In addition, here are the basic functionalities of the network layer:

      • Switching and routing technologies work here
      • Creates logical paths between two hosts across the world wide web called as virtual circuits
      • Routes the data packet to destination
      • Routing and forwarding of the data packets.
      • Internetworking, error handling, congestion control and packet sequencing work at this layer
      • Router works at layer three
      • Different network protocols like TCP/ IP, IPX, AppleTalk work at this layer
      See less
      • 0
      • Share
        Share
        • Share onFacebook
        • Share on Twitter
        • Share on LinkedIn
        • Share on WhatsApp
        • Report
    2. Asked: August 31, 2022In: Programming languages

      Which address does a NIC use when deciding whether to accept a frame?

      Soren Pundit
      Added an answer on August 31, 2022 at 3:41 pm

      The NIC uses the destination MAC address. Once the router is connected to the device, it automatically knows what the destination MAC address is.

      The NIC uses the destination MAC address. Once the router is connected to the device, it automatically knows what the destination MAC address is.

      See less
      • 0
      • Share
        Share
        • Share onFacebook
        • Share on Twitter
        • Share on LinkedIn
        • Share on WhatsApp
        • Report
    3. Asked: August 30, 2022In: Certifications

      CCNA practice test 200 301 free

      Soren Pundit
      Added an answer on August 30, 2022 at 7:07 pm

      The CCNA 200-301 tests your skills and your knowledge related to network fundamentals, network access, security fundamentals, automation and programmability.

      The CCNA 200-301 tests your skills and your knowledge related to network fundamentals, network access, security fundamentals, automation and programmability.

      See less
      • 0
      • Share
        Share
        • Share onFacebook
        • Share on Twitter
        • Share on LinkedIn
        • Share on WhatsApp
        • Report
    4. Asked: August 30, 2022In: Programming languages

      What are the two characteristics of a scalable network? (Choose two.)

      Soren Pundit
      Added an answer on August 30, 2022 at 4:54 pm

      The answer is the second and fourth statement: grows in size without impacting existing users and suitable for modular devices that allow for expansion.

      The answer is the second and fourth statement: grows in size without impacting existing users and suitable for modular devices that allow for expansion.

      See less
      • 0
      • Share
        Share
        • Share onFacebook
        • Share on Twitter
        • Share on LinkedIn
        • Share on WhatsApp
        • Report
    5. Asked: August 29, 2022In: Certifications

      Comptia a+ practice exams

      Soren Pundit
      Added an answer on August 29, 2022 at 12:17 pm

      If it is your first time for a certification taking, maybe you will see it a little bit difficult, but if you have basic knowledge, you will be fine.

      If it is your first time for a certification taking, maybe you will see it a little bit difficult, but if you have basic knowledge, you will be fine.

      See less
      • 0
      • Share
        Share
        • Share onFacebook
        • Share on Twitter
        • Share on LinkedIn
        • Share on WhatsApp
        • Report
    6. Asked: August 29, 2022In: Certifications

      DA 100-practice exam,

      Soren Pundit
      Added an answer on August 29, 2022 at 12:16 pm

      I advise you to find a partner to study and prepare with him to stay accountable for continuing your progress.

      I advise you to find a partner to study and prepare with him to stay accountable for continuing your progress.

      See less
      • 0
      • Share
        Share
        • Share onFacebook
        • Share on Twitter
        • Share on LinkedIn
        • Share on WhatsApp
        • Report
    7. Asked: August 28, 2022In: Certifications

      N10-006 exam questions

      Soren Pundit
      Added an answer on August 28, 2022 at 12:08 pm

      You have 90 minutes to pass the exam with a maximum of 90 questions. Prepare well and don’t panic while taking the exam. Good Luck!

      You have 90 minutes to pass the exam with a maximum of 90 questions.

      Prepare well and don’t panic while taking the exam.

      Good Luck!

      See less
      • 0
      • Share
        Share
        • Share onFacebook
        • Share on Twitter
        • Share on LinkedIn
        • Share on WhatsApp
        • Report
    8. Asked: August 27, 2022In: General

      vulnerability management lifecycle

      Soren Pundit
      Added an answer on August 27, 2022 at 5:50 pm

      The Vulnerability Management Lifecycle is a cybersecurity process that enhances an organization's ability to predict and respond to cyberattacks.

      The Vulnerability Management Lifecycle is a cybersecurity process that enhances an organization’s ability to predict and respond to cyberattacks.

      See less
      • 0
      • Share
        Share
        • Share onFacebook
        • Share on Twitter
        • Share on LinkedIn
        • Share on WhatsApp
        • Report
    9. Asked: August 27, 2022In: Certifications

      CCNA-200-301 exam questions

      Soren Pundit
      Added an answer on August 27, 2022 at 12:30 pm

      As mentioned above, the exam duration is not longer , thus, you don’t have too much time to think, just around 1 minutes per question.

      As mentioned above, the exam duration is not longer , thus, you don’t have too much time to think, just around 1 minutes per question.

      See less
      • 0
      • Share
        Share
        • Share onFacebook
        • Share on Twitter
        • Share on LinkedIn
        • Share on WhatsApp
        • Report
    10. Asked: August 26, 2022In: Programming languages

      Which statement correctly describes frame encoding?

      Soren Pundit
      Added an answer on August 26, 2022 at 2:02 pm

      It converts bits into a predefined code in order to provide a predictable pattern to help distinguish data bits from control bits

      It converts bits into a predefined code in order to provide a predictable pattern to help distinguish data bits from control bits

      See less
      • 0
      • Share
        Share
        • Share onFacebook
        • Share on Twitter
        • Share on LinkedIn
        • Share on WhatsApp
        • Report
    1 2 3 4 5

    Sidebar

    Ask A Question

    Questions Categories

    Certifications
    65Questions
    , 0Followers
    General
    38Questions
    , 0Followers
    Programming languages
    13Questions
    , 0Followers
    Communication
    9Questions
    , 0Followers
    Programmers
    5Questions
    , 0Followers
    Programs
    5Questions
    , 0Followers
    Language
    4Questions
    , 0Followers
    Gifts
    4Questions
    , 0Followers
    Company
    3Questions
    , 0Followers
    University
    3Questions
    , 0Followers
    Management
    2Questions
    , 0Followers
    Analytics
    2Questions
    , 0Followers
    Softwares
    1Question
    , 0Followers
    SEO
    1Question
    , 0Followers
    Design
    0Questions
    , 0Followers
    Games
    0Questions
    , 0Followers

    Trending Tags

    altura analytics backlinks cameraman comfortable company easy english french google language places programs public public toilet sanitation shoulder slinger towel usa gear trueshot

    Footer

    Search infos

    Searchinfos is an online space for exchanges on several topics between users.

    About Us

    • About Us
    • Contact Us

    Legal Stuff

    • Terms Of Use
    • Privacy Policy

    Articles

    • Blog

    Follow

    © Searchinfos. All Rights Reserved

    Insert/edit link

    Enter the destination URL

    Or link to existing content

      No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.