This site works best with JavaScript enabled
Sign In
Discussions
Activity
Sign In
Kernel Compilation Issues
Issue:fatal error: openssl/opensslv.h: No such file or directory 25 | #include | ^~~~~~~~~~~~~~~~~~~~compilation terminated.
To fix this problem, you have to install OpenSSL development package, which is available in standard rep…
by
pravjot
5:59AM
000 Linux System Administration
permalink
009.04.91.6. With the development of GRUB2 introducing scripting support and customizable menus
009.04.91.6. With the development of GRUB2 introducing scripting support and customizable menus, how has the role of boot loaders expanded beyond traditional boot management tasks to include more dynamic system configurations and user interface cust…
by
pravjot
May 6
009.04.Boot Loaders
permalink
009.08.Board Bringup. Paspberry Pi4
iam building kernel which below option we have to chose?make -j 4 SYNC include/config/auto.conf.cmd** Restart config...*** General setup*Compile also drivers which will not load (COMPILE_TEST) [N/y/?] nCompile the kernel with warnings as errors …
by
ramandeepwalia1994
May 5
009.08.Board Bringup. Raspberry Pi4
permalink
Implementing Merge Sort in C
Merge sort in C is a divide-and-conquer algorithm that sorts arrays by recursively dividing them into halves, sorting each half, and then merging them in a sorted manner, offering efficient and stable sorting.Below is a demo code that shows merge so…
by
mohdmohsinkhanee
March 26
Pravjot Sir Classes
permalink
5.what do you believe is the future role of traditional BIOS in modern computing
The future role of traditional BIOS is:-1. CompatibilityBios ensures hardware compatibility by providing a standardized interface for the operating system and device drivers. This allows software developers to write code that can run on a wide range…
by
gaurav133232
March 24
009.01.18.Introduction-to-BIOS-IQs
permalink
Understanding Static Behavior in C: Beyond Variables
In our previous discussion, we delved into the behavior of static variables in C, with a focus on Example 1. Now, let's continue our exploration by diving into Example 2 to further understand the nuances of static elements.
Example 2
// main.…
by
mohdmohsinkhanee
February 24
Pravjot Sir Classes
permalink
Understanding Static Behavior in C: Beyond Variables
1. When a variable is preceded with the keyword static, it becomes a part of the Data Segment in the Process Context. Since the data segment is itself divided into the initialized data section and uninitialized data section, static variables can be …
by
mohdmohsinkhanee
February 24
Pravjot Sir Classes
permalink
3. Describe process,purpose of option negotiation in TELNET, roles of WILL,WONT,DO,DONT
Option negotiation in TELNET involves the client and server communicating to establish preferred options for their interaction. These options may include aspects such as terminal type, terminal speed, and echoing behavior. The negotiation utilizes s…
by
mohdmohsinkhanee
February 21
014.06.18.Network Virtual Terminal
permalink
3. What are the key responsibilities of the bootloader in the Linux boot process
The key role of the bootloader in the Linux boot process is to load the Linux kernel into memory. It is loaded into memory by BIOS/UEFI once the system identifies the boot device.Examples of widely used Linux bootloaders include LILO (Linux Loader) …
by
mohdmohsinkhanee
February 17
009.01.Linux Boot Process
permalink
4. release of source code by Linksys and emergence of specialized Linux distributions like OpenWRT
The text highlights the release of source code by Linksys and the rise of specialized Linux distributions like OpenWRT for routers. The decision to release source code was driven by users' interest in exploring router hardware. Linksys released…
by
mohdmohsinkhanee
February 17
014.01.54.Routers And Linux
permalink
1.role of the Address Resolution Protocol (ARP) in the context of IP over Ethernet
The host places an IP packet inside an ethernet frame to transmit the packet across the physical layer to another host. Frames do not include IP address information, they use MAC(network) address. This is called as Address Resolution Protocol(ARP). …
by
gaurav133232
February 5
014.01.62.Ethernet-IP-ARP-NDP-IQs
permalink
2.Explain the concept of stateless configuration in IPv6
Stateless configuration in IPv6 eliminates the need for a central server in network configuration, distinguishing it from DHCP. The key advantages include no need for storing lease assignments, initiation within the link-local network, the availabil…
by
mohdmohsinkhanee
February 5
014.01.46.Automatic IPv6 Network Configuration. IQs
permalink
1.Why is DHCP commonly used in IPv4 networks,what advantages does it offer to nw admin
DHCP is commonly used in IPv4 networks for automatic host configuration. It provides IP addresses, subnet masks, default gateways, and DNS server information. The advantages for network administrators include preventing IP address conflicts and mini…
by
mohdmohsinkhanee
February 5
014.01.44.Understanding DHCP
permalink
1. Why is it essential for routers to include a firewall in network configurations?
When a packet is coming from the internet to the local network, the router doesn't know whether it is safe or not. If it is unsafe it can damage the entire network. Hence, routers need to include some kind of firewall. Firewalls protect the smm…
by
gaurav133232
February 3
014.01.56.Linux Firewall Basics
permalink
5.system service for network configuration should address,choosing network interfaces
The key questions that a network configuration system service must tackle include:
How does it decide between wired and wireless networks?What is the process for configuring the physical interface?How does it provide options for user-selected conne…
by
mohdmohsinkhanee
February 3
014.01.36.Manual and Boot Activated Nw Config
permalink
2.wireless networks, dimension of interface configuration, configuration of wired networks
In the context of wireless networks, the interface configuration involves additional dimensions which are not present in wired networks. These dimensions include network names, authentication methods, and encryption techniques. In wireless networks,…
by
mohdmohsinkhanee
February 3
014.01.36.Manual and Boot Activated Nw Config
permalink
10.Describe the -4 and -6 options for both the ping and host commands
The -4 and -6 options in the ping command determine whether to use IPv4 or IPv6 for echo messages. In the host command, they indicate a preference for IPv4 or IPv6, but the output may include both IPv4 and IPv6 addresses, reflecting the available in…
by
mohdmohsinkhanee
February 2
014.01.26.Basic ICMP And DNS Tools
permalink
1. Why is it essential for routers to include a firewall in network configurations?
014.01.56.1. Why is it essential for routers to include a firewall in network configurations? Explain the role of firewalls in safeguarding smaller networks from potentially harmful traffic originating from the internet.
by
pravjot
February 2
014.01.56.Linux Firewall Basics
permalink
1.What are the two protocols discussed in the text for interacting with hosts...
The text discusses two protocols for interacting with hosts: ICMP (Internet Control Message Protocol) and DNS (Domain Name System).
ICMP's specific functions include error reporting and network diagnostics. It is utilized to report errors enco…
by
mohdmohsinkhanee
February 1
014.01.26.Basic ICMP And DNS Tools
permalink
15.What command would you use to view IPv6 routes on a system
Command : ip -6 route showOutput Structure:Lists IPv6 routes on the system.Shows destination networks, next-hop addresses, and interface information.Prefix lengths and route attributes are displayed.May include source-specific routes and special en…
by
mohdmohsinkhanee
February 1
014.01.24.IPv6 Addresses And Networks
permalink
More Results
Powered by
Vanilla
Howdy, Stranger!
It looks like you're new here. If you want to get involved, click one of these buttons!
Sign In
Apply for Membership