Discover
Questions library
Collections library
Find online teacher
login
Discover
questions library
Find online teacher
login
Popular searches:
if-else
class-diagram
flowchart
Polymorphism
Home
Questions
Questions
Study lists
Mohamad Eskandarane Questions
11022 Questions
An indirect form of surveillance
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
413
Creating a computer or paper audit that can help detect wrong doings
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
344
Study of creating a d using encryption and decryption techniques
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
425
A unique piece of information that is used in encryption
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
448
Plain text is the data after encryption is performed
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
450
A cipher in which the order is not preserved
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
408
An attack in which the site is not capable of answering valid request
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
420
A program that copies itself
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
423
A small program that changes the way a computer operates
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
312
A program created by Farmer and Venema for auditing capability
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
453
A person who enjoys learning details about computers and how to enhance their capabilities
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
477
The protocol designed to make the security of wireless LAN as good as that of wired LAN
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
447
WTLS stands for?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
450
Total:
11022
Previous
589
590
591
592
593
Next
Go