- About
- Questions
- Polls
- Answers
- Best Answers
- Asked Questions
- Followed
- Favorites
- Groups
- Posts
- Comments
- Followers Questions
- Followers Answers
- Followers Posts
- Followers Comments
- Questions
- Polls
- Answers
- Best Answers
- Asked Questions
- Followed
- Favorites
- Groups
- Posts
- Comments
- Followers Questions
- Followers Answers
- Followers Posts
- Followers Comments
স্বয়ংক্রিয় অনুবাদ করার ক্ষমতা রয়েছে কোন প্রজন্মের কম্পিউটারের ?
পঞ্চম প্রজন্মের কম্পিউটারের স্বয়ংক্রিয় অনুবাদ করার ক্ষমতা রয়েছে।
পঞ্চম প্রজন্মের কম্পিউটারের স্বয়ংক্রিয় অনুবাদ করার ক্ষমতা রয়েছে।
See lessF1 থেকে F12 র্পযন্ত বাটন গুলোর কাজ কী ?
কিবোর্ডের F1 থেকে F12 Function key এর ব্যবহার গুলো কি কি কাজ যেনে নেই। F1 এর কাজ: F1 সাহায্যকারী কি হিসেবেই ব্যবহিত হয়। যখন F1 কি চাপা হয় তখন প্রত্যেক প্রোগ্রামেরই হেল্প পেইজ চলে আসে। F2 এর কাজ: F2 ধারণত কোনো ফাইল বা ফোল্ডার Rename করার জন্য ব্যবহার হয়। Alt+Ctrl+F2 চেপে মাইক্রোসফট ওয়ার্ডের নতুনRead more
কিবোর্ডের F1 থেকে F12 Function key এর ব্যবহার গুলো কি কি কাজ যেনে নেই।
F1 এর কাজ:
F1 সাহায্যকারী কি হিসেবেই ব্যবহিত হয়। যখন F1 কি চাপা হয় তখন প্রত্যেক প্রোগ্রামেরই হেল্প পেইজ চলে আসে।
F2 এর কাজ:
F2 ধারণত কোনো ফাইল বা ফোল্ডার Rename করার জন্য ব্যবহার হয়। Alt+Ctrl+F2 চেপে মাইক্রোসফট ওয়ার্ডের নতুন ডকুমেন্ট খোলা যায় । Ctrl+F2 চেপে মাইক্রোসফট ওয়ার্ডের প্রিন্ট প্রিভিউ দেখা হয়।
F3 এর কাজ:
F3 কি চাপলে মাইক্রোসফট উইন্ডোজসহ অনেক প্রোগ্রামের সার্চ অপশন চালু হয়।Shift+F3 চেপে মাইক্রোসফট ওয়ার্ডের লেখা বড় হাতের থেকে ছোট হাতের বা প্রত্যেক শব্দের প্রথম অক্ষর বড় হাতের বর্ণ দিয়ে শুরু ইত্যাদি কাজ করা হয়।
F4 এর কাজ:
F4 চেপে মাইক্রোসফট ওয়ার্ডের last action performed Repeat করা যায়। Alt+F4 চেপে সক্রিয় সব প্রোগ্রাম বন্ধ করা হয়। Ctrl+F4 চেপে সক্রিয় সব উইন্ডো বন্ধ করা হয়।
F5 এর কাজ:
F5 চেপে মাইক্রোসফট উইন্ডোজ, ইন্টারনেট ব্রাউজার ইত্যাদি Refresh করা হয়।পাওয়ার পয়েন্টের স্লাইড শো আরম্ভ করা হয়। এবং মাইক্রোসফট ওয়ার্ডের find, replace, go to উইন্ডো খোলা হয়।
F6 এর কাজ:
F6 চেপে মাউসের কার্সরকে ইন্টারনেট ব্রাউজারের অ্যাড্রেসবারে নিয়ে যাওয়া হয়। Ctrl+Shift+F6 চেপে মাইক্রোসফট ওয়ার্ড ডকুমেন্টে খোলা অন্য ডকুমেন্টটি সক্রিয় করা হয়।
F7 এর কাজ:
F7 চেপে মাইক্রোসফট ওয়ার্ডে লেখা বানান ও গ্রামার ঠিক করা হয় এবং মজিলা ফায়ারফক্সের Creat browsing চালু করা হয়। Shift+F7 চেপে মাইক্রোসফট ওয়ার্ডে কোনো নির্বাচিত শব্দের প্রতিশব্দ, বিপরীত শব্দ, শব্দের ধরন ইত্যাদি জানার ডিকশনারি চালু করা হয়।
F8 এর কাজ:
F8 কি টি অপারেটিং সিস্টেম চালু হওয়ার সময় কাজে লাগে। সাধারণত উইন্ডোজ Safe Mode-এ চালু করার জন্য এই কি টি চাপতে হয়।
F9 এর কাজ:
F9 কি চেপে Quark 0 এর মেজারমেন্ট টুলবার ওপেন করা হয়।
F10 এর কাজ:
F10 কি চেপে ইন্টারনেট ব্রাউজার বা কোনো খোলা উইন্ডোর মেনুবার নির্বাচন করা হয়।Shift+F10 চেপে কোনো নির্বাচিত লেখা বা লিংক বা ছবির ওপর মাউস রেখে ডান বাটনে ক্লিক করার কাজ করা হয়।
F11 এর কাজ:
F11 চেপে ইন্টারনেট ব্রাউজারের ফুল-স্ক্রিন মোড অন-অফ করা হয়।
F12 এর কাজ:
See lessF12 চেপে মাইক্রোসফট ওয়ার্ডের Save as উইন্ডো ওপেন করা হয়। Shift+F12 চেপে মাইক্রোসফট ওয়ার্ড ডকুমেন্ট সেভ করা হয়। এবং Ctrl+Shift+F12 চেপে মাইক্রোসফট ওয়ার্ড ডকুমেন্ট প্রিন্ট করা হয়।
What is PPTP Means?
PPTP Means "Point-to-Point Tunneling Protocol." PPTP is a networking standard for interfacing with virtual private organizations, or VPNs. VPNs are secure organizations that can be gotten to over the Internet, permitting clients to get to an organization from a distant area. This is valuable for indRead more
PPTP Means “Point-to-Point Tunneling Protocol.” PPTP is a networking standard for interfacing with virtual private organizations, or VPNs. VPNs are secure organizations that can be gotten to over the Internet, permitting clients to get to an organization from a distant area. This is valuable for individuals who need to associate with an office network from home or access their home PC from another area.
The “point-to-point” some portion of the term alludes the association made by PPTP. It permits one point (the client’s PC) to get to another particular point (a remote organization over the Internet. The “tunneling” a piece of the term alludes to the manner in which one protocol is embodied inside another protocol. In PPTP, the point-to-point protocol (PPP) is wrapped inside the TCP/IP protocol, which gives the Internet association. In this manner, despite the fact that the association is made over the Internet, the PPTP association emulates an immediate link between the two areas, taking into consideration a safe association.
PPTP is an information link layer protocol for wide region organizations (WANs) based on the Point-to-Point Protocol (PPP) and created by Microsoft that empowers network traffic to be typified and directed over an unstable public organization like the Internet. Point-to-Point Tunneling Protocol (PPTP) permits the making of virtual private organizations (VPNs), which burrow TCP/IP traffic through the Internet.
PPTP is an expansion of PPP and is based on PPP arrangement, confirmation, and encryption plans. PPTP embodies Internet Protocol (IP), Internetwork Packet Exchange (IPX), or NetBEUI bundles into PPP outlines, making a “burrow” for secure correspondence across a LAN or WAN link. The PPTP burrow is liable for validation and information encryption and makes it protected to communicate information over unstable networks.The Point-to-Point Tunneling Protocol (PPTP) is an out of date strategy for carrying out virtual private organizations. PPTP has many notable security issues.
PPTP utilizes a TCP control channel and a Generic Routing Encapsulation passage to epitomize PPP bundles. Numerous advanced VPNs utilize different types of UDP for this equivalent usefulness.
The PPTP particular doesn’t depict encryption or confirmation includes and depends on the Point-to-Point Protocol being burrowed to carry out all security functionalities.
The PPTP execution that boats with the Microsoft Windows item families carries out different degrees of confirmation and encryption locally as standard provisions of the Windows PPTP stack. The expected utilization of this protocol is to give security levels and remote access levels practically identical with run of the mill VPN items.
Point-to-point tunneling protocol (PPTP) is a bunch of correspondence decides that oversee the safe execution of virtual private organizations (VPN), which permit associations a strategy for broadening their own private organizations over the public Internet by means of “burrows.”
By utilizing PPTP, a huge association with dispersed workplaces can make an enormous neighborhood (LAN ) – basically a VPN – by utilizing the framework of a wide region organization (WAN), like the organization of a public Internet specialist co-op (ISP) or telecom. This is more practical than spreading out an organization framework over such distances.
PPTP empowers the formation of a solid course of move of information from a far off customer to a server in a private undertaking network through the making of a VPN over TCP/IP-based organizations, like the Internet. It permits distant clients to safely get to corporate organizations over the Internet, as though the customer is actually present in the corporate organization.
PPTP is an expansion of the point-to-point protocol previously utilized on the Internet, and Microsoft and its accomplices proposed it as a norm. Alongside Cisco’s proposition of the Layer 2 Tunneling Protocol, these recommendations might turn into the reason for the following Internet Engineering Task Force (IETF) standard.
PPTP offers the accompanying benefits:
Lower transmission costs: No extra help utilized, other than the Internet.
Lower equipment costs: Allows ISDN cards and modems to be isolated from RAS servers, which brings about less gadgets to buy and oversee.
Low authoritative overhead: Administrators just deal with the remote access server (RAS) and client accounts, instead of overseeing distinctive equipment designs.
Improved security: PPTP association is scrambled and gotten over the Internet and works with other networking protocols, similar to IP, Internetwork Packet Exchange (IPX) and NetBIOS Extended User Interface (NetBEUI).
See lessWhat is NAS storage?
Network-attached storage, or NAS, is an incredible way of putting away a lot of information while additionally making it open from anyplace. Around here at Cloudwards.net we suggest that a NAS be important for any careful reinforcement procedure and in this article we'll go through what is NARead more
Network-attached storage, or NAS, is an incredible way of putting away a lot of information while additionally making it open from anyplace. Around here at Cloudwards.net we suggest that a NAS be important for any careful reinforcement procedure and in this article we’ll go through what is NAS and, all the more explicitly, what a NAS isn’t.
We’ll be investigating what a NAS can and can’t do, too as how you can utilize it in your own arrangement to augment your storage space, while likewise keeping information secure for any little issues that might emerge. Try not to think, nonetheless, that network-attached storage is a reinforcement arrangement without anyone else: in case you’re hoping to protect your information, look at our best internet based reinforcement administrations or our best cloud reinforcement for NAS article.
A NAS gadget is a storage gadget associated with a network that permits storage and recovery of information from a focal area for approved network clients and fluctuated customers. NAS devices are adaptable and scale out, implying that as you really wanted extra storage, you can add to what you have. NAS resembles having a private cloud in the workplace. It’s quicker, more affordable and gives every one of the advantages of a public cloud nearby, giving you unlimited authority.
Network-attached storage (NAS) is devoted record storage that empowers different clients and heterogeneous customer devices to recover information from brought together plate limit. Clients on a neighborhood (LAN) access the common storage through a standard Ethernet association.
NAS devices commonly don’t have a console or show and are arranged and made do with a program based utility. Every NAS dwells on the LAN as an autonomous network hub, characterized by its own one of a kind Internet Protocol (IP) address.
NAS stands apart for its straightforward entry, high limit and minimal expense. The devices merge storage in one spot and backing a cloud level and assignments, for example, filing and reinforcement.
NAS and storage region networks (SANs) are the two primary sorts of networked storage. NAS handles unstructured information, like sound, video, sites, text files and Microsoft Office records. SANs are planned essentially for block storage inside information bases, otherwise called organized data.The SNIA Dictionary characterizes NAS as:
A term used to allude to storage devices that associate with a network and give record access administrations to computer systems. These devices by and large comprise of a motor that executes the record administrations, and at least one devices, on which information is put away. NAS utilizes record access conventions like NFS or CIFS.
Creators of programming applications fit to more modest business conditions will in general utilize document based systems to meet these objectives, especially those of adaptability, straightforwardness and simplicity of the executives; and there are a wide assortment of simple to-utilize devices to give security, and hearty reinforcement and recuperation.
NAS systems are famous with big business and independent companies in numerous ventures as viable, adaptable and minimal expense storage arrangements. They can be utilized to help email systems, bookkeeping information bases, finance, video recording and altering, information logging, business examination and the sky is the limit from there; a wide assortment of other business applications are supported by NAS systems.
Given the adaptability and ubiquity of NAS systems, most cloud suppliers offer NAS benefits; that makes it conceivable to blend and match NAS storage systems and cloud administrations in a business, permitting the capability of improving expense, the executives exertion and execution while giving the business full oversight over area and security.
NAS advanced from record servers utilized during the 1980s to give admittance to files to network customers. NAS devices commonly comprise of packaged equipment and programming with an underlying working framework, and they regularly use industry-standard network conventions, for example, SMB and NFS for remote document administration and information sharing and TCP/IP for information move. In an undertaking setting, NAS can permit IT groups to smooth out information storage and recovery while uniting their server and storage framework.
“With NAS, you have a document framework. At the point when you set up a NAS, it resembles a goliath shared drive. Also, you can set up heaps of various shared drives,” says Scott Sinclair, senior expert with Enterprise Strategy Group. “It can use the SMB convention, which is transcendently for Windows, or the NFS convention, which is predominately for Linux – those will in general be two major record based conventions for NAS.”
When you conclude that you wanted to store files on a network drive, you then, at that point, need to sort out how you intend to manage them, to figure out what sort of NAS you really wanted.
For instance, a normal business situation may be sharing admittance to Office files, similar to bookkeeping pages and Word reports, with your associates and maybe backing up select office devices consistently. All of that is somewhat basic for a NAS. Extra layers of information security and serving files to a generally huge number of clients is regularly where organizations should be cautious with regards to NAS storage.A NAS box is arranged with information move conventions, which are standard methods of sending information between devices. These conventions can be gotten to by customers through a switch, which is a focal server that associates with everything and courses demands. Information move conventions fundamentally let you access one more computer’s files as though they were your own.
Networks can run numerous information move conventions, however 2 are central to most networks: web convention (IP) and transmission control convention (TCP). TCP joins information into packets before they’re sent through an IP. Ponder TCP packets as compressed zip files and IPs as email addresses. On the off chance that your grandparents aren’t via web-based media and don’t approach your own cloud, you need to email them get-away photographs. Rather than sending those photographs 1-by-1, you can package them into zip files prior to sending them over. In comparative style, TCP joins files into packets before they’re sent across networks through IPs.
See lessHow to configure internet connection in Ubuntu server.
How to Configure Static IP Addresses On Ubuntu Server easy way. Configure Static IP Addresses On Ubuntu Server easy way. 1.Loginto terminal and enter root user like : sudo -i 2. Goto network config file: cd /etc/netplan/ 3. Tipe ls and you see the config file 50-cloud-init.yaml 4. Edite this configeRead more
How to Configure Static IP Addresses On Ubuntu Server easy way.
Configure Static IP Addresses On Ubuntu Server easy way.
See less1.Loginto terminal and enter root user like :
sudo -i
2. Goto network config file:
cd /etc/netplan/
3. Tipe ls and you see the config file 50-cloud-init.yaml
4. Edite this confige file :
sudo nano /etc/netplan/50-cloud-init.yaml
Yoy see this file code like :
# This file is generated from information provided by
# the datasource. Changes to it will not persist across an instance.
# To disable cloud-init’s network configuration capabilities, write a file
# /etc/cloud/cloud.cfg.d/99-disable-network-config.cfg with the following:
# network: {config: disabled}
network:
ethernets:
enp0s1:
addresses: []
dhcp4: true
version: 2
enp0s1 Is networking port.
You can replace this code :
# This file is generated from information provided by
# the datasource. Changes to it will not persist across an instance.
# To disable cloud-init’s network configuration capabilities, write a file
# /etc/cloud/cloud.cfg.d/99-disable-network-config.cfg with the following:
# network: {config: disabled}
network:
ethernets:
enp0s3:
addresses: [192.168.1.2/24]
gateway4: 192.168.1.1
nameservers:
addresses: [8.8.8.8,8.8.4.4]
dhcp4: no
version: 2
Exit and save your changes by running the commands below
sudo netplan apply
Now configured and saved Static IP Addresses On Ubuntu Server.