The 802.11 MAC layer ____________________ mode is based upon polling and serves as a centralized scheduling mechanism.

Fill in the blank(s) with the appropriate word(s).


HCCA

Computer Science & Information Technology

You might also like to view...

What is the most common character used to simulate a space?

A) underscore (_) B) asterisk (*) C) dash (-) D) plus sign (+)

Computer Science & Information Technology

A wireless access point connects to the wired network. What can you do to prevent unauthorized users from accessing shared files on the wired network?

A) Disable SSID broadcasting on the access point. B) Enable WEP, TKIP, or AES on the access point. C) Configure NTFS permissions on the shares. D) Install a firewall for the networks.

Computer Science & Information Technology

As computing power went up and costs when down, it made much more sense to put smaller controllers directly on each machine, to distribute the computing load and create a(n) ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which item in the figure above is used to create a freehand selection?

A. 2 B. 4 C. 7 D. 9

Computer Science & Information Technology