At regular intervals (normally every 100 ms) the wireless access point sends a beacon frame to announce its presence and to provide the necessary information for devices that want to join the network. This process is known as ____.

A. phishing
B. beaconing
C. pharming
D. mapping


Answer: B

Computer Science & Information Technology

You might also like to view...

The principal object of a hash function is __________ .

A. data integrity B. compression C. collision resistance D. mapping messages

Computer Science & Information Technology

Labels that display along the bottom of a chart to identify the category of the data are called:

A) data labels. B) category labels. C) picture elements. D) legends.

Computer Science & Information Technology

A ________ can be used to combine or separate data, change case, and apply formatting to a string of characters

A) schema B) data rule C) query D) text function

Computer Science & Information Technology

You can determine whether a variable is being passed by value or by reference by looking at the Call statement.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology