The Wired Equivalent Privacy (WEP) uses which encryption algorithm to encrypt data?
A) Blowfish
B) HMAC
C) AES
D) RC4
Answer: D) RC4
Computer Science & Information Technology
You might also like to view...
The @font-face rule is one example of a CSS @rule, which specifies a command or directive that controls how browsers interpret and run the contents of a CSS style sheet.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
To make columns B - D in a table equal width, you must first
A. click the Distribute Columns button B. click the Distribute Rows button C. select columns B - D D. key the desired width in the Cell Width box
Computer Science & Information Technology
The ____ numbering system is base 16; in other words, 16 numerals are used to express any given number.
A. binary B. decimal C. hexadecimal D. vigesimal
Computer Science & Information Technology
The Tools panel is divided into ____ sections.
A. 6 B. 8 C. 4 D. 10
Computer Science & Information Technology