Discover
Questions library
Collections library
Find online teacher
login
Discover
questions library
Find online teacher
login
Popular searches:
if-else
class-diagram
flowchart
Polymorphism
Home
Questions
Questions
Study lists
Mohamad Eskandarane Questions
11022 Questions
What do you mean by broadcasting in Networking?
Networks
2022-05-28
Answers
30
Question
40
Followers
30
0
1
5084
What is the maximum header size of an IP packet?
Networks
2022-05-28
Answers
30
Question
40
Followers
30
0
1
5110
What is the use of Ping command?
Networks
2022-05-28
Answers
30
Question
40
Followers
30
1
1
5086
When you connect to an online information service, you are asked to provide some kind of identification such as your name, an account number and a password. What is the name given to this brief dialog ?
Networks
2022-05-28
Answers
30
Question
40
Followers
30
0
1
428
………..is used to validate the identity of the message sender to the recipient
Networks
2022-05-28
Answers
30
Question
40
Followers
30
0
1
1337
Firewalls are used for
Networks
2022-05-28
Answers
30
Question
40
Followers
30
0
1
1045
Decryption and Encryption of data are the responsibility of which of the following layer?
Networks
2022-05-28
Answers
30
Question
40
Followers
30
0
1
1073
What is the port number for (HTTP Secure) HTTPS?
Networks
2022-05-28
Answers
30
Question
40
Followers
30
0
1
1142
………….transform message into format (cyber text) that cannot be read by hackers
Networks
2022-05-28
Answers
30
Question
40
Followers
30
0
1
1283
Number of rounds in Data Encryption Standard algorithm?
Networks
2022-05-28
Answers
30
Question
40
Followers
30
0
1
1081
Caesar cipher is represented as
Networks
2022-05-28
Answers
30
Question
40
Followers
30
0
1
1058
is an example for public key algorithm
Networks
2022-05-28
Answers
30
Question
40
Followers
30
0
1
1073
The length of the key in one time pad method is
Networks
2022-05-28
Answers
30
Question
40
Followers
30
0
1
1093
Total:
11022
Previous
642
643
644
645
646
Next
Go