Discover
Questions library
Collections library
Find online teacher
login
Discover
questions library
Find online teacher
login
Popular searches:
if-else
class-diagram
flowchart
Polymorphism
Home
Questions
Questions
Study lists
Mohamad Eskandarane Questions
11022 Questions
An indirect form of surveillance
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
440
Creating a computer or paper audit that can help detect wrong doings
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
379
Study of creating a d using encryption and decryption techniques
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
468
A unique piece of information that is used in encryption
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
485
Plain text is the data after encryption is performed
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
488
A cipher in which the order is not preserved
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
444
An attack in which the site is not capable of answering valid request
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
456
A program that copies itself
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
463
A small program that changes the way a computer operates
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
328
A program created by Farmer and Venema for auditing capability
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
482
A person who enjoys learning details about computers and how to enhance their capabilities
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
500
The protocol designed to make the security of wireless LAN as good as that of wired LAN
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
476
WTLS stands for?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
481
Total:
11022
Previous
589
590
591
592
593
Next
Go