1.
In the cryptography, the sequence of the letters is rearranged by?
2.
Which of the following algorithms is not used in asymmetric-key cryptography?
3.
The private key in asymmetric key cryptography is kept by?
4.
Which of the following methods is used to broadcast two packets on the medium at a time?
5.
Which of the following is true with regard to the ping command?
6.
How many digits of the Data Network Identification Code (DNIC) identify the country?
7.
Which of the through is share the data of two computer?
8.
In specific, if the systems use separate protocols, which one of the following devices is used to link two systems?
9.
The term LAN stands for?
10.
Which of the statement is correct with regard to Time Division Multiplexing (TDM) and its variants?