Discover
Questions library
Collections library
Find online teacher
login
Discover
questions library
Find online teacher
login
Popular searches:
if-else
class-diagram
flowchart
Polymorphism
Home
Questions
Questions
Study lists
Mohamad Eskandarane Questions
11022 Questions
What do you mean by broadcasting in Networking?
Networks
2022-05-28
Answers
30
Question
40
Followers
30
0
1
5122
What is the maximum header size of an IP packet?
Networks
2022-05-28
Answers
30
Question
40
Followers
30
0
1
5158
What is the use of Ping command?
Networks
2022-05-28
Answers
30
Question
40
Followers
30
1
1
5123
When you connect to an online information service, you are asked to provide some kind of identification such as your name, an account number and a password. What is the name given to this brief dialog ?
Networks
2022-05-28
Answers
30
Question
40
Followers
30
0
1
456
………..is used to validate the identity of the message sender to the recipient
Networks
2022-05-28
Answers
30
Question
40
Followers
30
0
1
1370
Firewalls are used for
Networks
2022-05-28
Answers
30
Question
40
Followers
30
0
1
1076
Decryption and Encryption of data are the responsibility of which of the following layer?
Networks
2022-05-28
Answers
30
Question
40
Followers
30
0
1
1111
What is the port number for (HTTP Secure) HTTPS?
Networks
2022-05-28
Answers
30
Question
40
Followers
30
0
1
1178
………….transform message into format (cyber text) that cannot be read by hackers
Networks
2022-05-28
Answers
30
Question
40
Followers
30
0
1
1323
Number of rounds in Data Encryption Standard algorithm?
Networks
2022-05-28
Answers
30
Question
40
Followers
30
0
1
1119
Caesar cipher is represented as
Networks
2022-05-28
Answers
30
Question
40
Followers
30
0
1
1086
is an example for public key algorithm
Networks
2022-05-28
Answers
30
Question
40
Followers
30
0
1
1104
The length of the key in one time pad method is
Networks
2022-05-28
Answers
30
Question
40
Followers
30
0
1
1140
Total:
11022
Previous
642
643
644
645
646
Next
Go