Minggu, 17 Juni 2012

Facebook Chat Tricks to get Mr Bean, Super Man & More


1) Mr. Bean

Code: 

[[255016264574238]] [[255016271240904]] [[255016277907570]]
[[255016267907571]] [[255016274574237]] [[255016384574226]]
[[255016387907559]] [[255016394574225]] [[255016401240891]]
[[255016391240892]] [[255016464574218]] [[255016454574219]]
[[255016457907552]] [[255016461240885]] [[255016451240886]]
[[255016537907544]] [[255016531240878]] [[255016534574211]]
[[255016541240877]] [[255016527907545]] [[255016634574201]]


2) The ELMO


[[302117289844540]] [[302117283177874]] [[302117276511208]] [[302117279844541]] [[302117286511207]] [[302117366511199]]
[[302117369844532]] [[302117373177865]] [[302117383177864]] [[302117379844531]] [[302117426511193]] [[302117436511192]]
[[302117429844526]] [[302117423177860]] [[302117433177859]] [[302117523177850]] [[302117529844516]] [[302117526511183]]
[[302117536511182]] [[302117533177849]] [[302117606511175]] [[302117596511176]] [[302117599844509]] [[302117593177843]]
[[302117603177842]] [[302117646511171]] [[302117649844504]] [[302117659844503]] [[302117656511170]] [[302117653177837]]
[[302117706511165]] [[302117703177832]] [[302117699844499]] [[302117709844498]] [[302117696511166]] [[302117749844494]]

3) Superman

Code:


[[299528860107644]] [[299528863440977]] [[299528866774310]] [[299528856774311]]
[[299528870107643]] [[299528950107635]] [[299528943440969]] [[299528946774302]]
[[299528953440968]] [[299528956774301]] [[299529013440962]] [[299529016774295]]
[[299529010107629]] [[299529003440963]] [[299529006774296]] [[299529060107624]]
[[299529063440957]] [[299529066774290]] [[299529070107623]] [[299529073440956]]
[[299529173440946]] [[299529183440945]] [[299529180107612]] [[299529176774279]]
[[299529186774278]] [[299529243440939]] [[299529236774273]] [[299529240107606]]

4) Jack Sparrow
Code:

[[298356520217565]] [[298356516884232]] [[298356506884233]] [[298356510217566]]
[[298356513550899]] [[298356620217555]] [[298356606884223]] [[298356616884222]]
[[298356610217556]] [[298356613550889]] [[298356673550883]] [[298356676884216]]
[[298356666884217]] [[298356680217549]] [[298356670217550]] [[298356740217543]]
[[298356733550877]] [[298356743550876]] [[298356730217544]] [[298356736884210]]
[[298356823550868]] [[298356810217536]] [[298356820217535]] [[298356826884201]]
[[298356813550869]] [[298356906884193]] [[298356896884194]] [[298356900217527]]
[[298356903550860]] [[298356893550861]] [[298356950217522]] [[298356946884189]]

5) The Mask

Code: 

[[255006724575192]] [[255006727908525]] [[255006737908524]] [[255006734575191]] [[255006731241858]]
[[255006827908515]] [[255006831241848]] [[255006824575182]] [[255006817908516]] [[255006821241849]]
[[255006874575177]] [[255006871241844]] [[255006884575176]] [[255006877908510]] [[255006881241843]]
[[255006934575171]] [[255006931241838]] [[255006941241837]] [[255006944575170]] [[255006937908504]]
[[255007004575164]] [[255007001241831]] [[255006994575165]] [[255006997908498]] [[255006991241832]]
[[255007084575156]] [[255007101241821]] [[255007077908490]] [[255007091241822]] [[255007081241823]]

6) One Direction

Code:


[[282043668538164]] [[282043671871497]] [[282043675204830]] [[282043681871496]] [[282043678538163]] [[282043788538152]] [[282043801871484]]
[[282043791871485]] [[282043795204818]] [[282043798538151]] [[282043878538143]] [[282043888538142]] [[282043875204810]] [[282043885204809]]
[[282043881871476]] [[282043971871467]] [[282043978538133]] [[282043975204800]] [[282043981871466]] [[282043968538134]] [[282044075204790]]
[[282044078538123]] [[282044071871457]] [[282044085204789]] [[282044081871456]] [[282044178538113]] [[282044168538114]] [[282044171871447]]
[[282044175204780]] [[282044181871446]] [[282044281871436]] [[282044285204769]] [[282044278538103]] [[282044271871437]] [[282044275204770]]

7) Any Image in the Chat

You can add profile pic of anyone in the chats in small thumbnail size as shown in the pic below.


Code: [[username]]

Note: Replace the "username" with the username of the profile of which, you need the photo

Example:
Mark Zuckerberg: [[zuck]]
Lady Gaga : [[ladygaga]]
Allrounder : [[be.updated]]


8) Animated Text

You can type any text in the Animated form like the pic below


Code for ALLROUNDER is :

[[107015582669715]] [[115807951764667]] [[115807951764667]] [[106699962703083]] [[116564658357124]] [[108634132504932]] [[112542438763744]] [[115430438474268]] [[106699962703083]]

You can Design your own Smileys using the following codes for Animated Symbols :

A [[107015582669715]]
B [[116067591741123]]
C [[115602405121532]]
D [[112542438763744]]
E [[115430438474268]]
F [[109225112442557]]
G [[111532845537326]]
H [[111356865552629]]
I [[109294689102123]]
J [[126362660720793]]
K [[116651741681944]]
L [[115807951764667]]
M [[106596672714242]]
N [[108634132504932]]
O [[116564658357124]]
P [[111669128857397]]
Q [[107061805996548]]
R [[106699962703083]]
S [[115927268419031]]
T [[112669162092780]]
U [[108983579135532]]
V [[107023745999320]]
W [[106678406038354]]
X [[116740548336581]]
Y [[112416755444217]]
Z [[165724910215]]




THIS POSTING JUST COPAS IN  here or theallrounder.co.in
Baca Selengkapnya →Facebook Chat Tricks to get Mr Bean, Super Man & More

Facebook Chat Tricks to get Mr Bean, Super Man & More

http://www.theallrounder.co.in/2012/04/facebook-chat-tricks-to-get-mr-bean.html
Baca Selengkapnya →Facebook Chat Tricks to get Mr Bean, Super Man & More

JAWABAN DHomesb Final Exam - CCNA Discovery: Networking For Home And Small Businesses (Version 4.0)




1 Bottom-up troubleshooting begins at which layer of the OSI model?
#physical layer

2 Which two statements are true about local applications? (Choose two.)
#They are accessed from a remote computer.
#They run on the computer where they are installed.

3 Refer to the exhibit. What default gateway address will be assigned to PC1 if access to remote resources is needed?
#192.31.7.3

4 Which attribute must be the same for wireless devices on one network to be able to communicate with devices on a different network?
#default gateway

5 How do ISPs obtain public IP addresses?
#They obtain the addresses from the RFC.

6 Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?
#remote access

7 Which wireless component allows wireless clients to gain access to a wired network?
#wireless bridge

8 Which network design layer provides a connection point for end user devices to the network?
#network

9 Which two transport layer protocols are used to transfer messages between hosts? (Choose two.)
#TCP
#UDP

10 An administrator is troubleshooting a network problem that involves the inability of users to reach Internet sites. During troubleshooting, the administrator is able to successfully ping web sites by their IP address, but pings to domain names are unsuccessful. Which service is most likely at fault?
#DNS

11 Refer to the graphic. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
#The wireless connection is good.

12 A company has a web server that must be accessible to both external and internal clients. Which security policy best practice should be followed to maximize security of the server?
#Keep the web server on the external network.

13 TCP/IP data transmission between the source and destination host is de-encapsulated in four steps:
A. The TCP header is removed.
B. Bits are decoded and the destination MAC address is recognized.
C. The IP header is removed and the contents are passed to the next layer.
D. The Ethernet header and trailer are removed.
What is the correct sequence of these steps?
#B, C, D, A

14 A computer joins the network and announces itself to all hosts on the LAN. What type of message does the computer
#broadcast

15 What are two ways that a user can interact with an operating system shell? (Choose two.)
#CLI
#GUI

16 What are two examples of peripheral input devices? (Choose two.)
external modem
#barcode reader
#digital camera
plotter
printer

17 What are three examples of logical configuration information used when planning a network implementation? (Choose three.)
#size of broadcast domains
#IP addressing scheme
#physical device location

18 Which wireless protocol is used for encryption?
#WEP

19 Which value represents the host portion of IP address 128.107.10.11 with a subnet mask of 255.255.0.0?
#.10.11

20 A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?
#DSL

21 What is the purpose of pop-up blocker software?
#It prevents the display of advertisement windows.

22 What are two advantages of purchasing a custom-built computer? (Choose two.)
#user can specify higher performance components
#supports higher-end graphics and gaming applications

23 Refer to the exhibit. PC1 is unable to access the web server at 209.165.200.226/27. Based on the provided output, what is the most likely cause of the problem?
#PC1 is configured with an incorrect IP address and default gateway.

24 What is the name for the contract between a customer and an ISP that specifies requirements for uptime and service response time?
#SLA

25 Which term is associated with logical addressing?
#IP addresses
26 Which Windows PC command line utility can be used to discover the path that a packet takes to reach a destination?
#tracert

27 Which statement accurately describes what network devices do in the distribution layer of the three layer design model?
#They interconnect local network segments.

28 Select three statements that correctly describe how DHCP services may be provided. (Choose three.)
#An integrated router can act as both DHCP server and DHCP client.
#Most home network integrated routers receive an IP configuration directly from their ISP.
#A variety of devices can act as DHCP servers, as long as they run DHCP service software.

29 Which two causes of networking problems are related to the physical layer? (Choose two.)
#disconnected cables
#improper operation of cooling fans

30 Which installation option should be chosen when the current operating system is too damaged to work properly?
#clean install

31 What is an ISP?
#It is an organization that enables individuals and businesses to connect to the Internet.

32 What two pieces of information should a help desk technician document while troubleshooting connectivity issues with an end user? (Choose two.)
#if the user can ping the default gateway address
#whether the PC uses dynamic or static IP addressing

33 Refer to the graphic. What feature can be installed on the Linksys integrated router to convert private IP addresses to Internet-routable addresses?
#NAT

34 After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features?
#firewall appliance

35 For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected?
#documenting the troubleshooting process

36 What is the default subnet mask for an IP address of 64.100.19.14?
#255.0.0.0

37 How does a crossover cable make it possible for two "like devices" (for example, two switches) to communicate?
#The transmit pins on one device are connected to the receive pins on the other device.

38 What will be one result of using a wireless infrastructure when designing the communications infrastructure for a new building?
#Wireless devices will be easy to add or relocate.

39 What does the term "attenuation" mean in data communication?
#loss of signal strength as distance increases

40 Which type of computer has an integrated mouse?
#laptop

41 Which Windows command is used to display the configured IP address, subnet mask, and default gateway?
#ipconfig

42 What must be identical on all devices in a WLAN for successful wireless communication between the devices?
#SSID

43 For devices that do not autosense, which connection requires a crossover cable?
#PC port to PC port

44 Refer to the exhibit. A user on Host1 requests a web page from the web server. Which diagram is accurate for the encapsulation of the traffic that is sent from the user to the web server?
(D) 

45 What describes the external IP address that is obtained by a router through a cable or DSL modem?
#a public address that is obtained through DHCP from the ISP

46 Which two components are configured via software in order for a PC to participate in a network environment? (Choose two.)
#IP address
#subnet mask

47 What destination IP address is used in a unicast packet?
#a specific host

48 Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a computer?
#infrared

49 What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.)
#ipconfig /release
#ipconfig /renew

50 What are the two possible values for a digital bit? (Choose two.)
#0
#1

51 Which picture shows a USB port on a PC?
PASTI BISA

52 What is the purpose of a router?
#to forward broadcasts to all interfaces so that all hosts receive them
to maintain a table of individual host addresses
to select the best path to reach remote networks
to physically connect multiple hosts that belong to the same network
Baca Selengkapnya →JAWABAN DHomesb Final Exam - CCNA Discovery: Networking For Home And Small Businesses (Version 4.0)

JAWABAN DHomesb Chapter 9 - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)


A technician is unsuccessful in establishing a console session between a PC and a Linksys integrated router. Both devices have power, and a cable is connected between them. Which two troubleshooting steps could help to diagnose this problem? (Choose two.)
Ensure the correct cable is used.
Ensure the link status LED on the integrated router is lit.

Identify two physical-layer network problems. (Choose two.)
hardware failure
loose cable connections

Only one workstation on a particular network cannot reach the Internet. What is the first troubleshooting step if the divide-and-conquer method is being used?
Check the workstation TCP/IP configuration.

Which two troubleshooting techniques are suitable for both home networks and large corporate networks? (Choose two.)
documenting the troubleshooting process
keeping a record of system upgrades and software versions

What two items could be checked to verify connectivity between the router and the ISP? (Choose two.)
router status page
connectivity status as indicated by LEDs

When acting as a DHCP server, what three types of information can an ISR provide to a client? (Choose three.)
default gateway
dynamic IP address
DNS server address

A customer called the cable company to report that the Internet connection is unstable. After trying several configuration changes, the technician decided to send the customer a new cable modem to try. What troubleshooting technique does this represent?
Substitution

Which troubleshooting method begins by examining cable connections and wiring issues?
bottom-up

What command is used to determine the location of delay for a packet traversing the Internet?
Tracert
A technician suspects that a Linksys integrated router is the source of a network problem. While troubleshooting, the technician notices a blinking green activity LED on some of the ports. What does this indicate?
The power supply is the source of the problem

Which three settings must match on the client and access point for a wireless connection to occur? (Choose three.)
SSID
Authentication
encryption key

What should a network administrator do first after receiving a call from a user who cannot access the company web server?
Ask the user what URL has been typed and what error message displays.

Refer to the graphic. What configuration is incorrect in the network shown?
The wired connection is the wrong type of cable.

A technician is troubleshooting a security breach on a new wireless access point. Which three configuration settings make it easy for hackers to gain access? (Choose three.)
broadcasting the SSID
using open authentication
using the default internal IP address

Refer to the graphic. What configuration is incorrect in the network shown?
The host IP address is incorrect.

Typically, help desk personnel assist end users in which two tasks? (Choose two.)
identifying when the problem occurred
implementing the solution to the problem

Network baselines should be performed in which two situations? (Choose two.)
after the network is installed and running optimally
after major changes are implemented on the network

Which two items should be added to the documentation following a troubleshooting event? (Choose two.)
final resolution
results of successful and unsuccessful troubleshooting steps

A PC is plugged into a switch and is unable to connect to the network. The UTP cable is suspected. What could be the problem?
A crossover cable is being used.

Which ipconfig command requests IP configuration from a DHCP server?
ipconfig /renew

Refer to the graphic. The wireless host cannot access the Internet, but the wired host can. What is the problem?
The host WEP key is incorrect.

How does remote-access software help in the troubleshooting process?
Diagnostics can be run without a technician being present at the site.

What command is used to determine if a DNS server is providing name resolution?
nslookup
Baca Selengkapnya →JAWABAN DHomesb Chapter 9 - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

JAWABAN DHomesb Chapter 8 - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)


Identify three techniques used in social engineering. (Choose three.)
Vishing
Phishing
Pretexting

A flood of packets with invalid source-IP addresses requests a connection on the network. The server busily tries to respond, resulting in valid requests being ignored. What type of attack occurred?
SYN flooding

While surfing the Internet, a user notices a box claiming a prize has been won. The user opens the box unaware that a program is being installed. An intruder now accesses the computer and retrieves personal information. What type of attack occurred?
Trojan horse

What is a major characteristic of a Worm?
exploits vulnerabilities with the intent of propagating itself across a network

During a pretexting event, how is a target typically contacted?
by phone

What term is used to describe a dedicated hardware device that provides firewall services?
appliance-based

Refer to the graphic. In the Linksys Security menu, what does the SPI Firewall Protection option Enabled provide?
It requires that packets coming into the router be responses to internal host requests.

Many best practices exist for wired and wireless network security. The list below has one item that is not a best practice. Identify the recommendation that is not a best practice for wired and wireless security.?
Disable the wireless network when a vulnerability analysis is being performed.

What environment would be best suited for a two-firewall network design?
a large corporate environment

Which statement is true about port forwarding within a Linksys integrated router?
Only external traffic that is destined for specific internal ports is permitted. All other traffic is denied.

Which two statements are true concerning anti-spam software? (Choose two.)
When anti-spam software is loaded, legitimate e-mail may be classified as spam by mistake.
Even with anti-spam software installed, users should be careful when opening e-mail attachments.

What type of advertising is typically annoying and associated with a specific website that is being visited?
Popups

To which part of the network does the wireless access point part of a Linksys integrated router connect?
Internal

What statement is true about security configuration on a Linksys integrated router?
Internet access can be denied for specific days and times.

Which abbreviation refers to an area of the network that is accessible by both internal, or trusted, as well as external, or untrusted, host devices?
DMZ

Which statement is true regarding anti-virus software?
Only after a virus is known can an anti-virus update be created for it.

What is one function that is provided by a vulnerability analysis tool?
It identifies missing security updates on a computer.

What part of the security policy states what applications and usages are permitted or denied?
acceptable use

What best practice relates to wireless access point security?
a change of the default IP address

What is a widely distributed approach to marketing on the Internet that advertises to as many individual users as possible via IM or e-mail?
spam
Baca Selengkapnya →JAWABAN DHomesb Chapter 8 - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

JAWABAN DHomesb Chapter 7 - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)



1
Why is IEEE 802.11 wireless technology able to transmit further distances than Bluetooth technology?
transmits at much lower frequencies
has higher power output
transmits at much higher frequencies
uses better encryption methods

2
What are three advantages of wireless over wired technology? (Choose three.)
more secure
longer range
anytime, anywhere connectivity
easy and inexpensive to install
ease of using licensed air space
ease of adding additional devices

3
What are two benefits of wireless networking over wired networking? (Choose two.)
speed
security
mobility
reduced installation time
allows users to share more resources
not susceptible to interference from other devices

4
A technician has been asked to provide wireless connectivity to the wired Ethernet network of a building. Which three factors affect the number of access points needed? (Choose three.)
the size of the building
the number of solid interior walls in the building
the presence of microwave ovens in several offices
the encryption method used on the wireless network
the use of both Windows and Appletalk operating systems
the use of shortwave or infrared on the AP

5
Why is security so important in wireless networks?
Wireless networks are typically slower than wired networks.
Televisions and other devices can interfere with wireless signals.
Wireless networks broadcast data over a medium that allows easy access.
Environmental factors such as thunderstorms can affect wireless networks.

6
What does the Wi-Fi logo indicate about a wireless device?
IEEE has approved the device.
The device is interoperable with all other wireless standards.
The device is interoperable with other devices of the same standard that also display the Wi-Fi logo.
The device is backwards compatible with all previous wireless standards.

7
Which statement is true concerning wireless bridges?
connects two networks with a wireless link
stationary device that connects to a wireless LAN
allows wireless clients to connect to a wired network
increases the strength of a wireless signal

8
Which WLAN component is commonly referred to as an STA?
cell
antenna
access point
wireless bridge
wireless client

9
Which statement is true concerning an ad-hoc wireless network?
created by connecting wireless clients in a peer-to-peer network
created by connecting wireless clients to a single, centralized AP
created by connecting multiple wireless basic service sets through a distribution system
created by connecting wireless clients to a wired network using an ISR

10
Refer to the graphic. In the Wireless menu option of a Linksys integrated router, what does the Network Mode option Mixed mean?
The router supports encryption and authentication.
The router supports both wired and wireless connections.
The router supports 802.11b, 802.11g, and 802.11n devices.
The router supports connectivity through infrared and radio frequencies.

11
Refer to the graphic. In the Wireless menu of a Linksys integrated router, what configuration option allows the presence of the access point to be known to nearby clients?
Network Mode
Network Name (SSID)
Radio Band
Wide Channel
Standard Channel
SSID Broadcast

12
Which two statements about a service set identifier (SSID) are true? (Choose two.)
tells a wireless device to which WLAN it belongs
consists of a 32-character string and is not case sensitive
responsible for determining the signal strength
all wireless devices on the same WLAN must have the same SSID
used to encrypt data sent across the wireless network

13
Which two statements characterize wireless network security? (Choose two.)
Wireless networks offer the same security features as wired networks.
Wardriving enhances security of wireless networks.
With SSID broadcast disabled, an attacker must know the SSID to connect.
Using the default IP address on an access point makes hacking easier.
An attacker needs physical access to at least one network device to launch an attack.

14
What type of authentication do most access points use by default?
Open
PSK
WEP
EAP

15
Which statement is true about open authentication when it is enabled on an access point?
requires no authentication
uses a 64-bit encryption algorithm
requires the use of an authentication server
requires a mutually agreed upon password

16
What are two authentication methods that an access point could use? (Choose two.)
WEP
WPA
EAP
ASCII
pre-shared keys

17
What is the difference between using open authentication and pre-shared keys?
Open authentication requires a password. Pre-shared keys do not require a password.
Open authentication is used with wireless networks. Pre-shared keys are used with wired networks.
Pre-shared keys require an encrypted secret word. Open authentication does not require a secret word.
Pre-shared keys require a MAC address programmed into the access point. Open authentication does not require this programming.

18
What term describes the encoding of wireless data to prevent intercepted data from being read by a hacker?
address filtering
authentication
broadcasting
encryption
passphrase encoding

19
What access-point feature allows a network administrator to define what type of data can enter the wireless network?
encryption
hacking block
traffic filtering
MAC address filtering
authentication

20
What are the two WEP key lengths? (Choose two.)
8 bit
16 bit
32 bit
64 bit
128 bit

21
Complete the following sentence: WEP is used to ______ , and EAP is used to _____ wireless networks.
encrypt; authenticate users on
filter traffic; select the operating frequency for
identify the wireless network; compress data on
create the smallest wireless network; limit the number of users on

Baca Selengkapnya →JAWABAN DHomesb Chapter 7 - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

Blogger templates

Pages - Menu

Menu

Loading...

Popular Posts