answersLogoWhite

0

\\computername\sharename

IP_ip_address

User Avatar

Wiki User

15y ago

What else can I help you with?

Related Questions

What advantage do switches have over a passive hub?

Switches provide each computer with the full network bandwidth when routing packets, where a hub splits the bandwidth of the network across all the ports it has.


How network printers works?

Network printing works like normal printing as far as your document is concerned, but the computer does a little more work. Normally, the computer sends the document to a printer physically plugged in to it and it prints. In this case, the printer isn't plugged in, but is instead on the network, usually connected another computer. The computer printing would send the data over the network to the computer hosting the printer as if the printer were plugged in to the local machine.


The network administrator needs to connect two routers directly via their FastEthernet ports What cable should the network administrator use?

straight cable is needed when connecting two computer periperhals. A cross over is used when connecting a computer to a network hardware (router, swirch, etc..)


Who had jurisdiction over the Cinque Ports?

Lord Warden had jurisdiction over the Cinque ports.


What are ports 135 and 137?

Port 135 is primarily used by the Microsoft DCOM (Distributed Component Object Model) service, facilitating communication between applications over a network. Port 137 is used by the NetBIOS Name Service, which helps in the resolution of NetBIOS names to IP addresses in local networks. Both ports are often targeted in network attacks, making them important to secure in network configurations.


Can you tell what passes into and out from the computer via its ports?

Ports on a computer allow various types of data to pass in and out. Input devices like keyboards and mice send data to the computer, while output devices like monitors and printers receive data. Additionally, network ports facilitate communication with other devices over a network, enabling data transfer for internet access or local networking. USB ports also support connections for storage devices and peripherals, allowing for both data input and output.


Can you use power over ethernet for usb ports?

Yes, you can use the power over ethernet for the USB ports.


What are lpr and raw in protocols?

LPR (Line Printer Remote) is a network printing protocol that allows clients to send print jobs to printers over a network, typically using TCP/IP. RAW, in this context, refers to a printing mode where data is sent directly to the printer without any processing or formatting, allowing for greater control over the print job. While LPR handles job management and queuing, RAW mode is often used for sending printer-specific commands or when dealing with non-standard data formats. Both are commonly utilized in network printing environments.


What is the meaning of ports in ICT?

In Information and Communication Technology (ICT), ports refer to virtual communication endpoints that allow different software applications to send and receive data over a network. Each port is identified by a unique number, typically ranging from 0 to 65535, with specific ports designated for particular services (e.g., HTTP uses port 80). Ports facilitate the organization of network traffic, enabling multiple applications to operate simultaneously on the same device without interference. They play a crucial role in networking protocols, security, and data transmission.


What is the function of network port?

A network port serves as a communication endpoint for networked devices, allowing them to send and receive data over a network. Each port is identified by a unique number and is associated with specific protocols, enabling different types of network services to operate simultaneously on a single device. Ports facilitate the organization of network traffic, ensuring that data packets reach the correct application or service on a device.


How many number of ports are vunerable for an attack in a computer?

By ports you could be referring to physical connection ports on a host machine, if so then all can be abused in some form to compromise or damage a machine. Physical access to a computer is often considered a 'game over' in terms of security. IF you mean TCP/UDP connection ports (network) then any open port can offer an attack surface. It is best practice to close all unused ports leaving open on those specifically needed. Using a firewall to do this is common practice, these can be in the form of software, embedded or dedicated hardware. Closing unused ports on edge devices (routers and servers) is a standard move when setting up a network. Be aware that any ports that are open can be subject to port redirection attacks, in this instance the use of a firewall and Access Control Lists (ACL's) can help mitigate this threat.


In the book Moby Dick Who had jurisdiction over the Cinque Ports?

The Duke of Wellington had jurisdiction over the Cinque Ports during the time of the events of Moby Dick.