Answer Posted / sridhar
A combination of hardware and software that protects a
network or computer.from unauthorized (outside) access.
| Is This Answer Correct ? | 6 Yes | 2 No |
Post New Answer View All Answers
Outline and discuss the main fields in Ethernet IEEE 802.3 frame. What are the main objectives of preamble ?
Convert the IP address 197.228.17.56 into binary ?
Describe and distinguish between FDMA, TDMA, and CDMA.
what is colour port? what is the use with it?
in linux what is the last ver to use of bootloader lilo,after lilo not use in linux and only use upper ver grub?
Explain any three error detection and correction techniques.
What is tdm?
Is the nyquist theorem true for optical fibre or only for copper wire ? Explain.
What is passive topology
Discuss the following terms with respect to ATM: VPI, UNI, asynchronous, AAL, Cell, PVC.
How do cryptography-based keys ensure the validity of data transferred across the network?
Explain Salient difference between ISO-OSI and TCP/IP models.
Compare the maximum window size in go-back-N and selective-repeat ARQs.
Define CableServe
What are the two reasons for using layered protocols?