Discover
Questions library
Collections library
Find online teacher
login
Discover
questions library
Find online teacher
login
Popular searches:
if-else
class-diagram
flowchart
Polymorphism
Home
Questions
Questions
Study lists
Mohamad Eskandarane Questions
11022 Questions
An indirect form of surveillance
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
444
Creating a computer or paper audit that can help detect wrong doings
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
383
Study of creating a d using encryption and decryption techniques
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
475
A unique piece of information that is used in encryption
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
490
Plain text is the data after encryption is performed
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
491
A cipher in which the order is not preserved
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
448
An attack in which the site is not capable of answering valid request
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
461
A program that copies itself
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
468
A small program that changes the way a computer operates
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
331
A program created by Farmer and Venema for auditing capability
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
486
A person who enjoys learning details about computers and how to enhance their capabilities
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
508
The protocol designed to make the security of wireless LAN as good as that of wired LAN
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
481
WTLS stands for?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
486
Total:
11022
Previous
589
590
591
592
593
Next
Go