Question about Computers & Internet

1 Answer

In a client server network, network administrator is responsible for user access and network resources.is this true or false?

Posted by on

1 Answer

  • Level 3:

    An expert who has achieved level 3 by getting 1000 points

    Superstar:

    An expert that got 20 achievements.

    All-Star:

    An expert that got 10 achievements.

    MVP:

    An expert that got 5 achievements.

  • Master
  • 2,878 Answers

True.

Posted on May 03, 2013

2 Suggested Answers

6ya6ya
  • 2 Answers

SOURCE: I have freestanding Series 8 dishwasher. Lately during the filling cycle water hammer is occurring. How can this be resolved

Hi,
a 6ya expert can help you resolve that issue over the phone in a minute or two.
best thing about this new service is that you are never placed on hold and get to talk to real repairmen in the US.
the service is completely free and covers almost anything you can think of (from cars to computers, handyman, and even drones).
click here to download the app (for users in the US for now) and get all the help you need.
goodluck!

Posted on Jan 02, 2017

PC REPAIR
  • 18 Answers

SOURCE: NAT Router - Problem

No static on the client side, but it's a good thing to run the server static.

You could setup a VPN into the LAN where the client machine is connected.

Stacey
PC REPAIR
www.wvpcrepair.com

Posted on Oct 13, 2008

Add Your Answer

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

1 Answer

Cannot access my hotmail a/c comes up server not found


Servers provide information for websites, hold Web pages, protect other computers from infection, provide authentication services and hold large numbers of files. Servers also connect email systems together. The average Web surfer encounters many servers in a day without realizing it. The mention of servers only arises when things go wrong. For example if the Hotmail Mail Server is inaccessible the user will receive an error message that the server cannot be found.

Client-Server In standard network communication all computers fall into one of two categories: clients and servers. Servers are bigger computers with large storage capacity and fast processing power. A server centralizes services that enable applications running on client computers to have access to more resources than their own computer could handle. The client is the local computer, the one the user accesses. The local computer, the client, contacts a remote computer, the server, with a request for a service. If the server is available, it responds with the requested service or resource. b> Hotmail Hotmail uses several types of servers. The screen the user accesses is actually an email client. It lists delivered email and enables users to write new emails. Originally, this program was always resident on the user's computer. Hotmail revolutionized the provision of email services by making this interface available on a website. The website itself is hosted on a Web server. The chain of clients and servers in a simple email transaction with email can soon become complicated. The user, on a home computer, is sitting at the client. The client program is the Web browser. The Web browser contacts a Web server to get and display the Hotmail page. b> Hotmail Servers b> Although the Hotmail page is resident on a server, it is a mail client and is also called a Mail User Agent, or MUA. It sends all outbound emails to a server called a Mail Submissions Agent, or MSA. The MSA sends the email to a server called a Mail Exchange, or MX, which then forwards it to another server called a Mail Delivery Agent, where the email sits until the user commands the mail client to go and find any new emails. b> Missing Server b> The server that Hotmail reports it was not able to find could be the Mail Submissions Agent, the Mail Exchange, or the Mail Delivery Agent. If the message arise during the sending of an email, the likelihood is that it is the Mail Submissions Agent that could not be contacted. If the error message occurs when Hotmail goes to find new received emails, it is likely to be the Mail Delivery Agent that could not be contacted. In either case, the user's connection is with the Web server and not either of these servers. There is little that the user can do to fix this problem other than try again later.

Feb 14, 2013 | HEWLETT-PACKARD Compaq Presario CQ56-129NR...

3 Answers

What is nap server?


Network Access Protection (NAP) is a Microsoft technology for controlling network access of a computer host based on the system health of the host, first introduced in Windows Server 2008.
With Network Access Protection, system administrators of an organization's computer network can define policies for system health requirements. Examples of system health requirements are whether the computer has the most recent operating system updates installed, whether the computer has the latest version of the anti-virus software signature, or whether the computer has a host-based firewall installed and enabled. Connecting or communicating computers have their health status evaluated. Computers that comply with system health requirements have full access to the network. Administrators can configure health policies that make it possible to ensure that computers not in compliance with system health requirements have restricted access to the network.

for more info. please visit the links below

http://en.wikipedia.org/wiki/Network_Access_Protection
http://msdn.microsoft.com/en-us/library/cc895519%28v=vs.85%29.aspx
http://technet.microsoft.com/en-us/network/bb545879

Feb 22, 2011 | Microsoft Windows 2000 Server

2 Answers

What proxy server can i use on facebook with chat?


There are a lot of proxy sites available to bypass your firewall restriction.

Here are few:

http://ads-blackfriday.com/
https://www.rbypass.info/
http://bypassfacebook.us/

just type www.facebook.com on the address field and hit Go.

Please tell me how this goes. Thank you for using FixYa.

Dec 06, 2010 | Facebook Social Network

1 Answer

What is proxy


Hi liverpool97.
Let me explain you about the Proxy servers.
In Computer Networks, a Proxy Server is a Server (a Computer system or an application program) that acts as an intermediary for requests from clients seeking resources from other servers.
A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server.
The proxy server evaluates the request according to its filtering rules.
For example, it may filter traffic by IP address or protocol. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client.
A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server.
In this case, it 'caches' responses from the remote server, and returns subsequent requests for the same content directly.
Hope this helps.
Please let me know if you need further information about the Proxy servers.
I'll be glad to assist you.

Sep 21, 2010 | Computers & Internet

1 Answer

I am trying to downlaod something but i need to wright a proxy sever but i don't know what a proxy sever is or how to do it?


In computer networks, a proxy server is a server (a computer system or an application program) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules. For example, it may filter traffic by IP address or protocol. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client. A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server. In this case, it 'caches' responses from the remote server, and returns subsequent requests for the same content directly.
A proxy server has a large variety of potential purposes, including:
1: To keep machines behind it anonymous (mainly for security.
2: To speed up access to resources (using caching). Web proxies are commonly used to cache web pages from a web server.
3: To apply access policy to network services or content, e.g. to block undesired sites
4: To log / audit usage, i.e. to provide company employee Internet usage reporting
5: To bypass security/ parental controls

Aug 01, 2010 | Computers & Internet

1 Answer

Difference between proxy server firewall and something called a gateway firewall ....Just a homework question..need another angle other then the veryconfusing textbook


In computer networks, a proxy server is a server (a computer system or an application program) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules. For example, it may filter traffic by IP address or protocol. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client. A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server. In this case, it 'caches' responses from the remote server, and returns subsequent requests for the same content directly.
A proxy server has many potential purposes, including:
  • To keep machines behind it anonymous (mainly for security).[1]
  • To speed up access to resources (using caching). Web proxies are commonly used to cache web pages from a web server.[2]
  • To apply access policy to network services or content, e.g. to block undesired sites.
  • To log / audit usage, i.e. to provide company employee Internet usage reporting.
  • To bypass security/ parental controls.
  • To scan transmitted content before delivery for malware.
  • To scan outbound content, e.g. for data leak protection.
  • To circumvent regional restrictions.
A proxy server that passes requests and replies unmodified is usually called a gateway or sometimes tunneling proxy.
A proxy server can be placed in the user's local computer or at various points between the user and the destination servers on the Internet.
A reverse proxy is a (usually) Internet-facing proxy used as a front-end to control and protect access to a server on a private network, commonly also performing tasks such as load-balancing, authentication, decryption or caching

A firewall is a dedicated appliance, or software running on a computer, which inspects network traffic passing through it, and denies or permits passage based on a set of rules.
It is a software or hardware that is normally placed between a protected network and an unprotected network and acts like a gate to protect assets to ensure that nothing private goes out and nothing malicious comes in.
A firewall's basic task is to regulate some of the flow of traffic between computer networks of different trust levels. Typical examples are the Internet which is a zone with no trust and an internal network which is a zone of higher trust. A zone with an intermediate trust level, situated between the Internet and a trusted internal network, is often referred to as a "perimeter network" or Demilitarized zone (DMZ).
A firewall's function within a network is similar to physical firewalls with fire doors in building construction. In the former case, it is used to prevent network intrusion to the private network. In the latter case, it is intended to contain and delay structural fire from spreading to adjacent structures.
Without proper configuration, a firewall can often become worthless. Standard security practices dictate a "default-deny" firewall ruleset, in which the only network connections which are allowed are the ones that have been explicitly allowed. Unfortunately, such a configuration requires detailed understanding of the network applications and endpoints required for the organization's day-to-day operation. Many businesses lack such understanding, and therefore implement a "default-allow" ruleset, in which all traffic is allowed unless it has been specifically blocked. This configuration makes inadvertent network connections and system compromise much more likely.

Dec 11, 2009 | Office Equipment & Supplies

1 Answer

2002 Cadillac ignition turn


  • A network is a group of computers (often called nodes or hosts) that can share information through their interconnections. A network is made up of the following components:

    Computer systems (nodes or hosts)
    Transmission media--a path for electrical signals between devices
    Network interfaces--devices that send and receive electrical signals
    Protocols--rules or standards that describe how hosts communicate and exchange data
    Despite the costs of implementation and maintenance, networks actually save organizations money by allowing them to:

    Consolidate (centralize) data storage
    Share peripheral devices like printers
    Increase internal and external communications
    Increase productivity and collaboration
    There are several ways to classify networks. The following table lists several ways to describe a network.

    Peer-to-Peer In a peer to peer network, the hosts provide and consume network services, and each host has the same operating system. Advantages of peer to peer networks include:
    Easy implementation
    Inexpensive
    Disadvantages of peer to peer networks include:
    Difficult to expand (not scalable)
    Difficult to support
    Lack centralized control
    No centralized storage

    Client/Server In a client/server network, hosts have specific roles. For example, some hosts are assigned server roles which allows them to provide network resources to other hosts. Other hosts are assigned client roles which allows them to consume network resources. Unlike peer to peer networks, hosts in a client/server network have different operating systems. Advantages of client/server networks include:
    Easily expanded (scalable)
    Easy support
    Centralized services
    Easy to backup
    Disadvantages of client/server networks include:
    Server operating systems are expensive
    Requires extensive advanced planning

    Geography and Size
    Local Area Network (LAN) LANs reside in a small geographic area, like in an office. A series of connected LANs, or a LAN connected across several buildings or offices, is called an internetwork.
    Wide Area Network (WAN) A WAN is a group of LANs that are geographically isolated but connected to form a large internetwork. When implementing a WAN, remember to provide local access to user resources to prevent a high rate of WAN traffic.
    Participation
    Private A LAN or WAN for private individual or group use which may or may not be secure. Examples include home and organization (small business, corporate, institute, government) networks. Intranets and extranets, although related to the Internet, are private networks. Both an extranet and intranet are tightly controlled, and made available only to select organizations. An extranet is made available to the public and an intranet is made available internally.
    Public A large collection of unrelated computers, with each node on the network having a unique address. The Internet, for example, is a public network. Because computers are unrelated and many companies and individuals share the same communication media, the public network is by nature insecure.
    Signalling
    Baseband Baseband signalling allows one signal at a time on the network medium (cabling).
    Broadband Broadband signalling divides the network medium into multiple channels, allowing several signals to traverse the medium at the same time.





Jul 08, 2009 | 1995 Cadillac Seville

1 Answer

Networking problem


Make it sure if the user you used in the laptop is administrator right because you need the administrator right to access some network computer. check also if the desktop share folder is share with full access it maybe the right is read only.

Apr 23, 2008 | Dell Inspiron XPS M140 Notebook

1 Answer

How to set up a security setting on my WBR-1310 D-Link router


Dear Sir/Madam

My compu name = manta
Installed windows server 2003
This administrator is the user name
Password = manta@123

In this manta system I created one limited user
User name = server
Password = server@123

In manta server in administrator user, I installed one software in D:\ shree this is shared folder
Means that path is \\ manta\d$\shree\setup.exe

I want access which I given in the path in client system.
But when user runs this software its asking server user name & password
I can’t type or give server user name & password again and again to client .
My mail id is manta4727@gmail.com plz send the answer. Thanking u

Jan 21, 2008 | Broadcom BCM5705 Network Adapter

Not finding what you are looking for?
Computers & Internet Logo

Related Topics:

51 people viewed this question

Ask a Question

Usually answered in minutes!

Top Computers & Internet Experts

Doctor PC
Doctor PC

Level 3 Expert

7733 Answers

kakima

Level 3 Expert

102366 Answers

David Payne
David Payne

Level 3 Expert

14161 Answers

Are you a Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

Loading...