Match each item with an statement below:

A. streamlines the transition process of a mobile client as it roams between APs.
B. type of access that most users associate with their personal computers.
C. wireless device designed to connect two or more wired or wireless networks.
D. capability to prioritize different types of frames.
E. access point with limited functionality.
F. Wi-Fi Alliance own QoS specification.
G. allows for multiple data paths for wireless transmissions.
H. designed to assist with the management of WLAN devices.
I. Ethernet switch that has embedded PoE technology.


A. Fast handoff
B. DAC
C. Remote wireless bridge
D. Quality of Service (QoS)
E. Thin access point
F. Wi-Fi Multimedia (WMM)
G. Wireless mesh network
H. IEEE 802.11v protocol
I. End-span

Computer Science & Information Technology

You might also like to view...

Blending modes determine how the colors in a layer ____________________, or interact, with the colors in the layers beneath that layer.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following names might give the human reader some hint about the data that is stored in them?

a. aa, bb, cc b. speed, distance, time c. hypotenuse, leg1, leg2 d. v1, v2, v3 e. principal, interest, payment

Computer Science & Information Technology

A linked list class uses a Node class with successor reference next and field element to store values. A recursive method to print all list elements can be written as

A) static void printList(Node list) { if (list != null) { System.out.println(list.element); printList(list.next); } } B) static void printList(Node list) { while (list!= null) { System.out.println(list.element) printList(list.next); list = list.next; } } C) static void printList(Node list) { while (list.next != null) { printList(list.next); System.out.println(list.element) list ++; } } D) static void printList(Node list) { System.out.println(list.element): printList(list.next); }

Computer Science & Information Technology

Which of the following is the vulnerability scanner from which OpenVAS was developed?

a. OpenVAS Pro b. Nessus c. ISS Scanner d. SuperScan

Computer Science & Information Technology