...Giving ways to Ideas
This is the place where you will find the answers to most of your tech queries, so subscribe and stay in touch. Suggestions and Questions from viewers are always welcome !!
Website by Snehal Masne :)
- ► 2014 (35)
- ► 2013 (41)
- ► 2012 (23)
- ► 2011 (22)
- ► 2010 (35)
- ► July (2)
- 99 ways to make your computer amazingly fast
- How to Decrypt, Unpack, and Edit .apk files (Android, Eclipse, APKTOOL) – Easy as Pie
- Megabytes, Gigabytes, Terabytes... What Are They?
- How to Import a Android Project (.apk file or folders) into Eclipse
- How to : Delete an Undeletable or Locked File
- Install Mac OS X Snow Leopard in VMWARE Windows 7 Edition
- Innovative Ways To Access Blocked Sites
- About Me
- Add an article to this website!
- A collection of Funny Geek quotes / Computer jokes
- ’Rolling back’
- 50GB free storage
- 64-bit Computing
- 720p vs1080p
- About TechProceed.com
- Access Blocked Sites
- Adblock Plus
- Android 4.2 Jelly Bean
- Android Apps
- Android Fragmentation
- Android Phones
- Android Project
- Android Secret Codes
- Apple iCloud
- Apple iphone 4G
- Apple iPhone 5
- Ask a Question
- BBM for Android & iPhone
- Beginners Quick Reference
- being hacked
- Best antivirus
- Best Linux Distribution
- best operating system
- big files
- block ads
- Blogger to Domain
- blogger tricks
- bootable pen drive
- Browse Anonymously
- Browser’s Search Box
- CEO of Yahoo
- Chrome App
- Chrome Extensions
- Code Snippets
- Command Prompt
- Computer jokes
- Connect Computers
- Copy and Paste
- Cracking Password
- create A Huge File
- Creating own Websites
- Cross Cable
- data usage
- design principles
- Device Manager
- Drive Letters
- Earn money
- edit APK
- Edit Websites
- Enable USB Debugging
- Essential Skills for Geeks
- Expensive Applications
- Extend Battery Life
- Facebook likes
- Facebook Without Internet
- Favorite Websites
- find virus
- fix android phone
- Flash to HTML5
- Galaxy Grand2
- Galaxy S5
- Geek quotes
- Google is God
- Google Tricks
- Google's Bouncing Balls
- Google’s History
- Hack Wifi
- Hacking Tools
- HD Ready Or Full HD
- Hidden Folders
- Hidden User Account
- Hiren's BootCD
- How-to Guides
- HTC M8
- HTC One
- Increase Traffic
- Internet Download Connections
- Internet Speed
- Internet Tricks
- iOS 6
- iOS 7
- IP address
- iPhone 6
- iPod Touch Apps
- ISO Files
- Java 8 features
- Java code snippets
- Learn CAPTCHA
- LIfe explaination
- limit internet usage
- Linux Directory Structure
- Linux System Monitoring Tools
- Lock Computer
- Locked File
- Logical Partitions
- Make Money
- make your computer fast
- Marissa Mayer
- Mobile Phones
- Mobile Websites
- Most Useful Websites
- Moto E
- Moto G
- Moto X
- Neel Mehta
- Network settings
- Nexus 4
- Nexus 6
- Nokia X
- Nokia X+
- Nokia XL
- NSA spying scandal
- OnePlus One
- Online Banking
- Online Education/Tutorials
- Open Source
- OS X Snow Leopard
- Partition a USB Flash Drive
- Perpetual Motion Machine
- Photoshop Tips and Tricks
- Popular on the Internet
- Portable Windows
- PPS to PPT
- Process is Using a File
- Productivity Hacks
- Programmers' Jokes
- Quick Notes: SCJP 1.6
- Remote Access
- Remote Control
- Remove Background
- Restore GRUB
- root Android
- Samsung Vs Apple
- Save Money
- save space
- Saved passwords
- SCJP revision
- Send From Browser To Android
- Share Files
- Sharing Data
- Shopping Online
- Speed Up
- Speed up PC
- Tablet Buying Guide
- Tatkal Tickets
- The Scale of the Universe
- Top 5 Best Databases
- torrent sharing
- Transfer Files
- Unix / Linux
- Unresponsive Program
- USB 3.0
- USB Drive
- Web 2.0 and Web 3.0
- Website Without Internet
- What is PRISM
- What's Hot
- Whatsapp for PC
- Why do we need IPv6
- Why still WIndows XP?
- Wi-Fi access
- Wi-Fi Tweaks
- Windows 10
- Windows 7
- Windows Problems
- Windows registry
- Windows services
- WordPress Plugins
- Xiaomi Redmi 1S
- YU Yureka
Here I bring you to How to connect two computers/Laptops using LAN Cable. so that you built your own network to share files, play counter strike, and much more…
Basic things required while building up a network are
LAN Cable with rj45 connectors
Computers/Netbook between the networking is to be done.
RJ45 is basically called as Register Jacket. It is a piece of plastic bound with different types of wires in a particular and sequential range for the purpose of running of different of different applications. This jack helps to enable you to ping with the other node.
We do networking by using TCP/IP ports. Each computer have its individual IP address. IP address are basically classified in 3 types A, B, C ranging from 1 to 225.
Class A – 0 to 127
Class B – 128 to 191
Class C – 192 to 223
Here are step which can help you to built a network at your home on your own.
- The First and the basic step before setting up a network is to check whether LAN drivers are successfully installed on both the computers.
- Insert the cable in connectors on both computers.
- Go to Start>Control Panel>Network Connections>right click on Local Area Connection>properties>(TCP/IP)>properties.
- Click on “use the following IP address“.
- Remember you have to put IP addresses ranging from 1 to 254 only.
IP address: 192.168.1.1
Subnet mask: 255.255.255.0 (appear default)
Default Gateway: Leave blank
Follow the same steps for the second PC but here you just have to change the IP address, for instance you can keep it 192.168.1.2 and other two kept same.
Save the settings for both the computers. To test whether both computers are connect we ping the each other IP. If you get a reply, then your network is setup successfully.
All are set, know enjoy sharing and gaming.
• There are 10 types of people in the world: those who understand binary, and those who do not.
• If at first you do not succeed, call it version 1.0
• I am not anti-social; I am just not user friendly
• My software never has bugs. It just develops random features
• Roses are #FF0000, Violets are #0000FF, and my entire base belongs to you
• In a world without fences and walls, who needs Gates and Windows?
• Hand over the calculator, friends do not let friends derive drunk
• I would love to change the world, but they will not give me the source code
• Enter any 11-digit prime number to continue...
• The box said 'Requires Windows 95 or better'. Therefore, I installed LINUX
• A penny saved is 1.39 cents earned, if you consider income tax
• UNIX, DOS and Windows...the good, the bad and the ugly
• A computer lets you make more mistakes faster than any invention in human history - with the possible exceptions of handguns and tequila
• The code that is the hardest to debug is the code that you know cannot possibly be wrong
• UNIX is basically a simple operating system, but you have to be a genius to understand the simplicity
• Ethernet (n): something used to catch the ether bunny
• You know it's love when you memorize her IP number to skip DNS overhead
• JUST SHUT UP AND REBOOT!!
• 1f u c4n r34d th1s u r34lly n33d t0 g37 l41d
• Alcohol & calculus don't mix. Never drink & derive
• How do I set a laser printer to stun?
• There is only one satisfying way to boot a computer
• Concept: On the keyboard of life, always keep one finger on the escape button
• It's not bogus, it's an IBM standard
• Be nice to the nerds, for all you know they might be the next Bill Gates!
• The farther south you go, the more dollar stores there are
• Beware of programmers that carry screwdrivers
• The difference between e-mail and regular mail is that computers handle e-mail, and computers never decide to come to work one day and shoot all the other computers
• If you want a language that tries to lock up all the sharp objects and fire-making implements, use Pascal or Ada: the Nerf languages, harmless fun for children of all ages, and they won't mar the furniture
• COFFEE.EXE Missing - Insert Cup and Press Any Key
• Programming today is a race between software engineers striving to build bigger and better idiot-proof programs, and the Universe trying to produce bigger and better idiots. So far, the Universe is winning
• LISP = Lots of Irritating Silly Parentheses
• The beginning of the programmer's wisdom is understanding the difference between getting program to run and having a runnable program
• Squash one bug, you'll see ten new bugs popping
• Everytime i time i touch my code, i give birth to ten new bugs
• Boast = blogging is open & amiable sharing of thoughts
• We are sorry, but the number you have dialed is imaginary. Please rotate your phone 90 degrees and try again
• Cannot find REALITY.SYS. Universe halted
• If it weren't for C, we'd all be programming in BASI and OBO
• Bad command or file name! Go stand in the corner
• Bad or corrupt header, go get a haircut
• Unrecognized input, get out of the class
• Warning! Buffer overflow, close the tumbler !
• WinErr 547: LPT1 not found... Use backup... PENCIL & PAPER
• Bad or missing mouse driver. Spank the cat? (Y/N)
• Computers make very fast, very accurate mistakes
• Best file compression around: "rm *.*" = 100% compression
• Hackers in Hollywood movies are phenomenal. All they need to do is "c:\> hack into fbi"
• BREAKFAST.COM Halted...Cereal Port Not Responding
• I survived an NT installation
• The name is Baud......James Baud
• My new car runs at 56Kbps
• Why doesn't DOS ever say "EXCELLENT command or filename!"
• File not found. Should I fake it? (Y/N)
• Cannot read data, leech the next boy's paper? (Y/N)
• CONGRESS.SYS Corrupted: Re-boot Washington D.C (Y/n)?
• Does fuzzy logic tickle?
• Helpdesk : Sir, you need to add 10GB space to your HD , Customer : Could you please tell where I can download that?
• Windows: Just another pane in the glass
• Who's General Failure & why's he reading my disk?
• RAM disk is not an installation procedure
• Shell to DOS...Come in DOS, do you copy? Shell to DOS...
• The truth is out there...anybody got the URL?
• Smash forehead on keyboard to continue.....
• E-mail returned to sender -- insufficient voltage
• Help! I'm modeming... and I can't hang up!!!
• Once I got this error on my Linux box: Error. Keyboard not attached. Press F1 to continue
• Once I got this error on my Linux box: Error. Mouse not attached. Please left click the 'OK' button to continue
• Press any key to continue or any other key to quit...
• Press every key to continue
• Helpdesk: Sir if you see the blue screen, press any key to continue. Customer : hm.. just a min.. where's that 'any key'..
• Idiot, Go ahead, make my data!
• Old programmers never die; they just give up their resources
• To err is human - and to blame it on a computer is even more so
• Logical Error CLINTON.SYS: Truth table missing
• Clinton:/> READ | PARSE | WRITE | DUMP >> MONKIA.SYS
• (D)inner not ready: (A)bort (R)etry (P)izza
• Computers can never replace human stupidity
• A typical Yahoo! inbox : Inbox(0), Junk(9855210)
• (A)bort, (R)etry, (P)anic?
• Bugs come in through open Windows
• Penguins love cold, they wont survive the sun
• Unix is user friendly...its just selective about who its friends are
• Artificial intelligence usually beats real stupidity
• Bell Labs Unix -- Reach out and grep someone.
• To err is human...to really foul up requires the root password.
• Invalid password : Please enter the correct password to (Abort / Retry / Ignore )
• FUBAR - where Geeks go for a drink
• I degaussed my girlfriend and I'm just not attracted to her anymore
• Scandisk : Found 2 bad sectors. Please enter a new HD to continue scanning
• Black holes are where God divided by zero
• Hey! It compiles! Ship it!
• Thank god, my baby just compiled
• Yes! My code compiled, and my wife just produced the output
• Windows 98 supports real multitasking - it can boot and crash simultaneously
• Zap! And there was the blue screen !
• Please send all spam to my main address, root@localhost :-)
• MailerD(a)emon: You just received 9133547 spam. (O)pen all, (R)ead one by one, (C)heck for more spam
• A: Can you teach me how to use a computer? B: No. I just fix the machines, I don't use them
• PayPal: Your funds have been frozen for 668974 days
• 1-800-404 : The subscriber you are trying to call does not exist
• 1-800-403 : Access to that subscriber was denied
• Error message: "Out of paper on drive D:"
• If I wanted a warm fuzzy feeling, I'd antialias my graphics!
• A printer consists of three main parts: the case, the jammed paper tray and the blinking red light
• "Mr. Worf, scan that ship." "Aye Captain. 300 dpi?"
• Smith & Wesson: The Original Point And Click Interface
• Shout onto a newsgroup : It echoes back flames and spam
• Firewall : Intruder detected. (A)llow in (D)eactivate the firewall
• Real programmers can write assembly code in any language
• Warning! Perl script detected! (K)ill it , (D)eactivate it
• Firewall : Do you want to place a motion detector on port 80 ?
• Helpdesk: Sir, please refill your ink catridges Customer : Where can i download that?
• All computers run at the same speed... with the power off
• You have successfully logged in, Now press any key to log out
• Sorry, the password you tried is already being used by Dorthy, please try something else.
• Sorry, that username already exists. (O)verwrite it (C)ancel
• Please send all flames, trolls, and complaints to /dev/toilet
• Shut up, or i'll flush you out
• Cron : Enter cron command \ Now enter the number of minutes in an hour
• We are experiencing system trouble -- do not adjust your terminal
• You have successfully hacked in, Welcome to the FBI mainframes.
• I'm sorry, our software is perfect. The problem must be you
• Never underestimate the bandwidth of a station wagon full of tapes hurling down the highway
• Webhost live help: Sir you ran out of bandwidth, User: Where can I download that?
• If Ruby is not and Perl is the answer, you don't understand the question
• Having soundcards is nice... having embedded sound in web pages is not
• My computer was full, so I deleted everything on the right half
• You have received a new mail which is 195537 hours old
• Yahoo! Mail: Your email was sent successfully. The email will delivered in 4 days and 8 hours
• I'm sorry for the double slash (Tim Berners-Lee in a Panel Discussion, WWW7, Brisbane, 1998)
• Ah, young webmaster... java leads to shockwave. Shockwave leads to RealAudio. And RealAudio leads to suffering
• What color do you want that database?
• C++ is a write-only language. I can write programs in C++, but I can't read any of them
• As of next week, passwords will be entered in Morse code
• earth is 98% full ... please delete anyone you can
• A typical yahoo chat room: "A has signed in, A has signed out, B has signed in, B has signed out, C has signed in, C has signed out.."
• When someone says "I want a programming language in which I need only say what I wish done," give him a lollipop
• Warning! No processor found! Press any key to continue
• Failure is not an option. It comes bundled with your Microsoft product
• NT is the only OS that has caused me to beat a piece of hardware to death with my bare hands
• Warning! Kernel crashed, Run for your lives !
• NASA uses Windows? Oh great. If Apollo 13 went off course today the manual would just tell them to open the airlock, flush the astronauts out, and re-install new one
• How's my programming? Call 1-800-DEV-NULL
• Yes, friends and neighbors, boys and girls - my PC speaker crashed NT
• root:> Sorry, you entered the wrong password, the correct password is 'a_49qwXk'
• New Linux package released. Please install on /dev/null
• Quake and uptime do not like each other
• Unix...best if used before: Tue Jan 19 03:14:08 GMT 2038
• As you well know, magic and weapons are prohibited inside the cafeteria -- Final Fantasy VIII
• Man is the best computer we can put aboard a spacecraft...and the only one that can be mass produced with unskilled labo
• Unix is the only virus with a command line interface
• Windows 95 makes Unix look like an operating system
• How are we supposed to hack your system if it's always down!
• God is real, unless declared integer
• I'm tempted to buy the slashdot staff a grammar checker. What do they do for 40 hours a week?
• Paypal : Please enter your credit card number to continue
• It takes a million monkeys at typewriters to write Shakespeare, but only a dozen monkeys at computers to run Network Solutions
• Please help - firewall burnt down - lost packet - reward $$$
• If Linux were a beer, it would be shipped in open barrels so that anybody could piss in it before delivery
• Thank you Mario! But our princess is in another castle
• Perl, the only language that looks the same before and after RSA encryption
• Norton: Incoming virus - (D)ownload and save (R)un after download
• I had a dream... and there were 1's and 0's everywhere, and I think I saw a 2!
As Geeks we are expected to have a certain set of skills that the majority of the population does not possess. This list is by no means complete, but I think it is a good sample of the skills required to be a true geek. I won’t pretend to have all the skills listed here. I even had to Google a few of them.
Like all good Geeks you should be able to utilize resources to accomplish any of these things. Knowing where to look for the knowledge is as good as having it so give yourself points if you are certain that you could Google the knowledge necessary for a skill.
- Properly secure a wireless router.
- Crack the WEP key on a wireless router.
- Leech Wifi from your neighbor.
- Screw with Wifi leeches.
- Setup and use a VPN.
- Work from home or a coffee shop as effectively as you do at the office.
- Wire your own home with Ethernet cable.
- Turn a web camera into security camera.
- Use your 3G phone as a Wi-Fi access point.
- Understand what “There’s no Place Like 127.0.0.1” means.
- Identify key-loggers.
- Properly connect a TV, Tivo, XBox, Wii, and Apple TV so they all work together with the one remote.
- Program a universal remote.
- Swap out the battery on your iPod/iPhone.
- Benchmark Your Computer
- Identify all computer components on sight.
- Know which parts to order from NewEgg.com, and how to assemble them into a working PC.
- Troubleshoot any computer/gadget problem, over the phone.
- Use any piece of technology intuitively, without instruction or prior knowledge.
- How to irrecoverably protect data.
- Recover data from a dead hard drive.
- Share a printer between a Mac and a PC on a network.
- Install a Linux distribution. (Hint: Ubuntu 9.04 is easier than installing Windows)
- Remove a virus from a computer.
- Dual (or more) boot a computer.
- Boot a computer off a thumb drive.
- Boot a computer off a network drive.
- Replace or repair a laptop keyboard.
- Run more than two monitors on a single computer.
- Successfully disassemble and reassemble a laptop.
- Know at least 10 software easter eggs off the top of your head.
- Bypass a computer password on all major operating systems. Windows, Mac, Linux
- Carrying a computer cleaning arsenal on your USB drive.
- Bypass content filters on public computers.
- Protect your privacy when using a public computer.
- Surf the web anonymously from home.
- Buy a domain, configure bind, apache, MySQL, php, and Wordpress without Googling a how-to.
- Basic *nix command shell knowledge with the ability to edit and save a file with vi.
- Create a web site using vi.
- Transcode a DVD to play on a portable device.
- Hide a file in an image using steganography.
- Knowing the answer to life, the universe and everything.
- Share a single keyboard and mouse between multiple computers without a KVM switch.
- Google obscure facts in under 3 searches. Bonus point if you can use I Feel Lucky.
- Build amazing structures with LEGO and invent a compelling back story for the creation.
- Understand that it is LEGO, not Lego, Legos, or Lego’s.
- Build a two story house out of LEGO, in monochrome, with a balcony.
- Construct a costume for you or your kid out of scraps, duct tape, paper mâché, and imagination.
- Be able to pick a lock.
- Determine the combination of a Master combination padlock in under 10 minutes.
- Assemble IKEA furniture without looking at the instructions. Bonus point if you don’t have to backtrack.
- Use a digital SLR in full manual mode.
- Do cool things to Altoids tins.
- Be able to construct paper craft versions of space ships.
- Origami! Bonus point for duct tape origami. (Ductigami)
- Fix anything with duct tape, chewing gum and wire.
- Knowing how to avoid being eaten by a grue.
- Know what a grue is.
- Understand where XYZZY came from, and have used it.
- Play any SNES game on your computer through an emulator.
- Burn the rope.
- Know the Konami code, and where to use it.
- Whistle, hum, or play on an iPhone, the Cantina song.
- Learning to play the theme songs to the kids favorite TV shows.
- Solve a Rubik’s Cube.
- Calculate THAC0.
- Know the difference between skills and traits.
- Explain special relativity in terms an eight-year-old can grasp.
- Recite pi to 10 places or more.
- Be able to calculate tip and split the check, all in your head.
- Explain that the colours in a rainbow are roygbiv.
- Understand the electromagnetic spectrum – xray, uv, visible, infrared, microwave, radio.
- Know the difference between radiation and radioactive contamination.
- Understand basic electronics components like resistors, capacitors, inductors and transistors.
- Solder a circuit while bottle feeding an infant. (lead free solder please.)
- The meaning of technical acronyms.
- The coffee dash, blindfolded (or blurry eyed). Coffee
[cream] [sugar]. In under a minute.
- Build a fighting robot.
- Program a fighting robot.
- Build a failsafe into a fighting robot so it doesn’t kill you.
- Be able to trace the Fellowship’s journey on a map of Middle Earth.
- Know all the names of the Dwarves in The Hobbit.
- Understand the difference between a comic book and a graphic novel.
- Know where your towel is and why it is important.
- Re-enact the parrot sketch.
- Know the words to The Lumberjack Song.
- Reciting key scenes from Monty Python and the Holy Grail.
- Be able to recite at least one Geek Movie word for word.
- Know what the 8th Chevron does on a Stargate and how much power is required to get a lock.
- Be able to explain why it’s important that Han shot first.
- Know why it is just wrong for Luke and Leia to kiss.
- Stop talking Star Wars long enough to get laid.
- The ability to name actors, characters and plotlines from the majority of sci-fi movies produced since 1968.
- Cite Mythbusters when debunking a myth or urban legend.
- Sleep with a Cricket bat next to your bed.
- Have a documented plan on what to do during a zombie or robot uprising.
- Identify evil alternate universe versions of friends, family, co-workers or self.
- Be able to convince TSA that the electronic parts you are carrying are really not a threat to passengers.
- Talk about things that aren’t tech related.
- Get something on the front page of Digg.
The process of converting the subnet to binary and decimal can drive the unfamiliar insane, not to mention the waste of precious time and brain power which can be utilized for other areas of exam preparation.
Let's take a look at a shortcut method that will cut down the time needed to answer these questions without the need for a calculator.
This article assumes that you know how to perform subnetting in the traditional method but it is important to stress that there are only 3 classes of usable IP addresses which are:
1 - 126
(127 is reserved for loopback)
128 - 191
192 - 223
You must understand and remember this table well in order to master the shortcut.
Note: You must borrow at least 2 bits and must leave at least 2 bits.
The Subnet Table:
|Bits Borrowed (N)|| |
|Bit Value|| |
|Subnet Mask|| |
|Number of Subnets ((2^N)-2)|| |
Stop: Before continuing, please read this very important article regarding the use of the ((2^N)-2) method of subnetting.
If using the (2^N) method as defined in RFC 1878, your table would look like this instead.
|Bits Borrowed (N)|| |
|Bit Value|| |
|Subnet Mask|| |
|Number of Subnets |
The subnet table is commonly seen in lecture notes or certification guides but what the author/lecturer did not tell you is how to derive this table on the fly. Its actually quite simple, lets look at it line by line.
- Bits borrowed, this is the easy one, just remember that the table consists of only 8 columns.
- Bits Value, remember by heart that the first value starts with 128 and the subsequent values are divided by two.
- Subnet Mask, this line tells you what the subnet mask would be, to get the figures, add up the corresponding bits value and all of the values prior to it. 128 + 0 (there is no prior value) =128 128 + 64 = 192 192 + 32 = 224 224 + 16 = 240 240 + 8 = 248 248 + 4 = 252 252 + 2 + 254 254 + 1 + 255
- Number of Subnets, tells you how many subnet you'll get if you use the subnet mask. Just look at the corresponding N value at the top and you can derive the figures.
How to Tackle the Questions:
There are only a few different ways that Microsoft or Cisco can phrase their questions, lets take a look at some examples:
Question Type 1:
If you are to determine the subnet mask based on a number of hosts and an IP address...
You are assigned an IP address of 172.30.0.0 and you need 1000 hosts on your network, what is your subnet mask.
- Determine the number of bits needed for the hosts. In this scenario, we need ten bits as 2^10 = 1024 (the question asks for 1000 hosts only).
- Determine the number of bits left for the subnet. 32 - (number of bits needed for the host) which is 32-10 = 22 bits.
- Determine the number of bits actually borrowed. We take the number of bits left for the subnet and minus as many 8s as possible as each 8 represents 1 octal. Therefore 22 - 8 - 8 = 6 bits were borrowed.
|Bits Borrowed (N)|| |
|Bits Value|| |
|Subnet Mask|| |
|Number of Subnets |
With reference to the subnet table, 6 bits would have a subnet of 255.255.252.0 . Take note that a total of two 8s were subtracted off, therefore the first two octal would be 255.255.x.x and the 3rd octal was 6 bits borrowed which leaves with 255.255.252.x.
Question Type 2:
If you were given an IP address of 172.30.0.0 and you need 15 subnets...
|Bits Borrowed (N)|| |
|Bits Value|| |
|Subnet Mask|| |
|Number of Subnets |
With reference to the subnet table, the subnet mask should be 255.255.248.0. 172.30.0.0 is a Class B address and the subnet should be 255.255.0.0.
Question Type 3:
You are assigned an IP address of 172.30.0.0 and you need 55 subnets, how many hosts do you have per subnet?
- Determine the number of bits used for the subnet.
Bits Borrowed (N)12345678 Bits Value1286432168421 Subnet Mask128192224240248252254255 Number of Subnets
According to the chart, the closest match to 55 subnet would be 62 and therefore, the number of bits borrowed for the subnet is 6. Since 172.30.0.0 is a Class B, we would need to add another 16 bits to the 6 making it 22 bits in total.
- Determine the number of bits used for the host. Number of bits used for the hosts is 32 - (number of bits used for the subnet) which is 22 = 10 bits. 2^10-2 = 1022, therefore there are a total of 1022 usable hosts in each subnet.
Good luck on your next exam.
There are more than 300,000 apps available in the Apple App Store, and they optimize the use and the features of your iPod Touch. The new Apple iPod Touch 4G has raised the bar even higher for portable MP3 players, and now you can access the Internet with it, make video calls with it, watch videos on it and the various apps are simply tools that are meant to make all these tasks more enjoyable and productive at the same time.
Apple iPod Touch Apps List
With that information in mind, here are some of the top iPod Touch apps that you make use of today, divided into the various categories in the Store.
|Category||Top Free App Name||Top Paid App Name|
|Books|| || |
|Business|| || |
|Entertainment|| || |
|Games|| || |
|Music|| || |
|Utilities|| || |
|Travel|| || |
|Sports|| || |
|Productivity|| || |
|Health & Fitness|| || |
One thing I want make clear is that, This is not a “Computer virus”. (You may check the definition of that word on the net) Then what exactly is it ?
It is actually a computer program designed to block the website not expected in colleges, companies or any other official places. This -SAM- program will only block pornographic sites, harmful sites and sites like orkut, my space n so on.
What can be assured is it will not harm your computer in any way, also its not having any kind of destructive purpose. Instead if -SAM- is running, rest of the viruses cant exist in the same computer, yes this is one of the best features of -SAM- program.
-SAM- was actually a module of our project “System Maintenance Suite” - one of the top 8 softwares awarded in India in IIT TechFest !
-SAM- was spread by mistake while experimenting on college PCs, want to say that it was not spread desperately. Still if you don’t like that you may run the removal of -SAM- provided above.