Question. The protocol designed to make the security of wireless LAN as good as that of wired LAN. |
1 | _____________ Conducted at developers site. |
2 | Winchester disks are a type of _______ |
3 | __________ describes the effect of involving the reader with the story, of constructing it as truth. |
4 | Which of these is a part of network identification? |
5 | Study of creating a d using encryption and decryption techniques. |
6 | The maximum number of bits sufficient to represent an octal number in binary is _______ |
7 | What does GUI stand for? |
8 | A topology that is responsible for describing the geometric arrangement of components that make up the LAN. |
9 | The process of verifying the identity of a user. |
10 | LRU stands for ___________ |
11 | A transmission mode that can transmit data in both the directions but transmits in only one direction at a time. |
12 | ______________ leads to concurrency. |
13 | PDAs are also called? |
14 | Any computer that can access the server is called? |
15 | Each personal computer has a _________ that manages the computers arithmetical logical and control activities. |
16 | A network that links many different types of computers all over the world. |
17 | Another name for white-box testing is ___________ |
18 | Which of the following is often called the double precision format? |
19 | The 9 s complement of 45 is _____________ |
20 | _____________ enables the migration of the virtual image from one physical machine to another |