Answer Posted / sridhar
A combination of hardware and software that protects a
network or computer.from unauthorized (outside) access.
Is This Answer Correct ? | 6 Yes | 2 No |
Post New Answer View All Answers
Give the equivalent binary word for the polynomial x8+x2+x+1.
What do you mean by link to link layers of OSI reference model? Explain their functions briefly?
Explain leaky bucket algorithm and compare it with token bucket algorithm.
Which layer is used to detect and correct errors
Why TCP/IP reference model is more popular than OSI model ?
Explain Various fields in Ethernet frame format
What are the advantages of cell switching that is used in ATM?
What is autonomous system
I am using vm ware In my system and I am using 2003server in vm ware ( my o.s is XP ) Now I would like to install .zip in my 2003server machine .how can I do this
What is tdm?
Explain network topologies ?
Write a short note on ISDN?
Differentiate between IEEE 802.3, IEEE 802.4 and IEEE 802.5 standards.
Why is IP called ‘best-effort delivery’ protocol?
Why Use VSATs?