Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
In asymmetric key cryptography, the private key is kept by
B. receiver
B. receiver
See lessIn cryptography, what is cipher?
A. algorithm for performing encryption and decryption
A. algorithm for performing encryption and decryption
See lessWhich one of the following is not used in media access control?
D. none of the mentioned
D. none of the mentioned
See lessWhich protocol assigns IP address to the client connected in the internet?
A. dhcp
A. dhcp
See lessWhich one of the following is not an application layer protocol used in internet?
C. resource reservation protocol
C. resource reservation protocol
See lessInternet works on
A. packet switching
A. packet switching
See lessWhich one of the following protocol is not used in internet?
D. none of the mentioned
D. none of the mentioned
See lessISP exchanges internet traffic between their networks by
A. internet exchange point
A. internet exchange point
See lessInternet access by transmitting digital data over the wires of a local telephone network is provided by
B. digital subscriber line
B. digital subscriber line
See lessTo join the internet, the computer has to be connected to a
C. internet service provider
C. internet service provider
See less