問題一覧
1
White noise (Thermal noise or Gaussian noise)
2
Impulse noise (Noise spike)
3
Crosstalk
4
Echo
5
Jitter
6
Attenuation
7
single-bit error
8
burst error
9
Redundancy
10
Error Detection
11
Parity Check (Vertical Redundancy Check)
12
Specifically, each row of the array is a data block that is to be transmitted
13
Two-Dimensional Parity (Longitudinal Redundancy Check
14
It comes in two (2) basic forms: even parity and odd parity. The basic concept of parity checking is that a bit is added to a string of bits to create either even parity or odd parity.
15
Arithmetic Checksum
16
Review the XOR function and Binary Division.
17
Cyclic Redundancy Checksum
18
It has two (2) sides: sender’s side (checksum creation) and receiver’s side (checksum validation)
19
A simple method of error detection is by adding redundant bits called parity bits to each character.
20
Stop-and-Wait ARQ
21
the source was not found
22
Go-Back-N ARQ
23
Selective Repeat ARQ
24
Confidentiality
25
is the art of ensuring that data is transmitted from source to destination without alteration.
26
Integrity
27
It is the information created and stored by an organization that needs to be available to authorized entities
28
Availability
29
Authentication
30
Single-factor authentication
31
Two-factor authentication
32
It is accomplished through encryption.
33
It is an intrusion on network infrastructure. , The attacker first analyzes the environment and collects information in order to exploit the existing open ports or vulnerabilities. , An attack can be performed either from outside of the organization by an unauthorized entity or from within the company by an “insider” that already has some access to the network.
34
Snooping
35
Traffic Analysis
36
Modification
37
Masquerading
38
Replaying
39
Repudiation
40
Denial of Service (DoS)
41
Network sniffing (packet sniffing)
42
Spoofing
43
IP address spoofing
44
ARP spoofing
45
DNS spoofing
46
Man-in-the-middle (MITM) attack
47
Denial-of-Service (DoS)
48
Trojan horse
49
Session hijacking
50
Phishing
51
Encryption
52
Ciphertext
53
Encryption Algorithm
54
Decryption
55
Cryptosystem
56
Cryptography
57
Cryptanalysis
58
Cryptology
59
key
60
Symmetric Cryptosystems
61
Public-Key Cryptosystems (or Asymmetric Cryptosystems)
The Contemporary World Mock test (Prelims)
The Contemporary World Mock test (Prelims)
Xai Alexandrei Delos Reyes · 58問 · 2年前The Contemporary World Mock test (Prelims)
The Contemporary World Mock test (Prelims)
58問 • 2年前Computing Mock test (Prelims)
Computing Mock test (Prelims)
Xai Alexandrei Delos Reyes · 67問 · 2年前Computing Mock test (Prelims)
Computing Mock test (Prelims)
67問 • 2年前Programming Mock Test (Prelims)
Programming Mock Test (Prelims)
Xai Alexandrei Delos Reyes · 64問 · 2年前Programming Mock Test (Prelims)
Programming Mock Test (Prelims)
64問 • 2年前Entrepreneurship Mock Test (Prelims)
Entrepreneurship Mock Test (Prelims)
Xai Alexandrei Delos Reyes · 23問 · 2年前Entrepreneurship Mock Test (Prelims)
Entrepreneurship Mock Test (Prelims)
23問 • 2年前Computing Mock Test (Midterms) BSIT 107
Computing Mock Test (Midterms) BSIT 107
Xai Alexandrei Delos Reyes · 76問 · 2年前Computing Mock Test (Midterms) BSIT 107
Computing Mock Test (Midterms) BSIT 107
76問 • 2年前Math Mock Test (Prelims)
Math Mock Test (Prelims)
Xai Alexandrei Delos Reyes · 48問 · 2年前Math Mock Test (Prelims)
Math Mock Test (Prelims)
48問 • 2年前Programming Mock Test (Midterms) BSIT 107
Programming Mock Test (Midterms) BSIT 107
Xai Alexandrei Delos Reyes · 52問 · 2年前Programming Mock Test (Midterms) BSIT 107
Programming Mock Test (Midterms) BSIT 107
52問 • 2年前UTS Mock Test (Midterms) BSIT107
UTS Mock Test (Midterms) BSIT107
Xai Alexandrei Delos Reyes · 40問 · 2年前UTS Mock Test (Midterms) BSIT107
UTS Mock Test (Midterms) BSIT107
40問 • 2年前Entrepreneurship Mock Test (Midterms) BSIT 107
Entrepreneurship Mock Test (Midterms) BSIT 107
Xai Alexandrei Delos Reyes · 38問 · 2年前Entrepreneurship Mock Test (Midterms) BSIT 107
Entrepreneurship Mock Test (Midterms) BSIT 107
38問 • 2年前Contemporary World Mock Test (Midterms) BSIT 107
Contemporary World Mock Test (Midterms) BSIT 107
Xai Alexandrei Delos Reyes · 28問 · 2年前Contemporary World Mock Test (Midterms) BSIT 107
Contemporary World Mock Test (Midterms) BSIT 107
28問 • 2年前Math Mocktest (Midterms) BSIT 107
Math Mocktest (Midterms) BSIT 107
Xai Alexandrei Delos Reyes · 24問 · 2年前Math Mocktest (Midterms) BSIT 107
Math Mocktest (Midterms) BSIT 107
24問 • 2年前Computer Programming Mocktest (Pre-finals)
Computer Programming Mocktest (Pre-finals)
Xai Alexandrei Delos Reyes · 26問 · 2年前Computer Programming Mocktest (Pre-finals)
Computer Programming Mocktest (Pre-finals)
26問 • 2年前Math Mocktest (Pre-Finals)
Math Mocktest (Pre-Finals)
Xai Alexandrei Delos Reyes · 19問 · 2年前Math Mocktest (Pre-Finals)
Math Mocktest (Pre-Finals)
19問 • 2年前Computing Mock Test (Pre-finals)
Computing Mock Test (Pre-finals)
Xai Alexandrei Delos Reyes · 36問 · 2年前Computing Mock Test (Pre-finals)
Computing Mock Test (Pre-finals)
36問 • 2年前Computing Mock Test Finals
Computing Mock Test Finals
Xai Alexandrei Delos Reyes · 26問 · 2年前Computing Mock Test Finals
Computing Mock Test Finals
26問 • 2年前Comprog 2nd sem (prelims) BSIT 205
Comprog 2nd sem (prelims) BSIT 205
Xai Alexandrei Delos Reyes · 63問 · 1年前Comprog 2nd sem (prelims) BSIT 205
Comprog 2nd sem (prelims) BSIT 205
63問 • 1年前Discrete Math 2nd sem (prelims) BSIT 205
Discrete Math 2nd sem (prelims) BSIT 205
Xai Alexandrei Delos Reyes · 36問 · 1年前Discrete Math 2nd sem (prelims) BSIT 205
Discrete Math 2nd sem (prelims) BSIT 205
36問 • 1年前Art Appreciation (Prelim) BSIT 205
Art Appreciation (Prelim) BSIT 205
Xai Alexandrei Delos Reyes · 56問 · 1年前Art Appreciation (Prelim) BSIT 205
Art Appreciation (Prelim) BSIT 205
56問 • 1年前Ethics 2nd sem (Prelims) BSIT 205
Ethics 2nd sem (Prelims) BSIT 205
Xai Alexandrei Delos Reyes · 45問 · 1年前Ethics 2nd sem (Prelims) BSIT 205
Ethics 2nd sem (Prelims) BSIT 205
45問 • 1年前STS 2nd Sem (Prelim) BSIT 205
STS 2nd Sem (Prelim) BSIT 205
Xai Alexandrei Delos Reyes · 40問 · 1年前STS 2nd Sem (Prelim) BSIT 205
STS 2nd Sem (Prelim) BSIT 205
40問 • 1年前問題一覧
1
White noise (Thermal noise or Gaussian noise)
2
Impulse noise (Noise spike)
3
Crosstalk
4
Echo
5
Jitter
6
Attenuation
7
single-bit error
8
burst error
9
Redundancy
10
Error Detection
11
Parity Check (Vertical Redundancy Check)
12
Specifically, each row of the array is a data block that is to be transmitted
13
Two-Dimensional Parity (Longitudinal Redundancy Check
14
It comes in two (2) basic forms: even parity and odd parity. The basic concept of parity checking is that a bit is added to a string of bits to create either even parity or odd parity.
15
Arithmetic Checksum
16
Review the XOR function and Binary Division.
17
Cyclic Redundancy Checksum
18
It has two (2) sides: sender’s side (checksum creation) and receiver’s side (checksum validation)
19
A simple method of error detection is by adding redundant bits called parity bits to each character.
20
Stop-and-Wait ARQ
21
the source was not found
22
Go-Back-N ARQ
23
Selective Repeat ARQ
24
Confidentiality
25
is the art of ensuring that data is transmitted from source to destination without alteration.
26
Integrity
27
It is the information created and stored by an organization that needs to be available to authorized entities
28
Availability
29
Authentication
30
Single-factor authentication
31
Two-factor authentication
32
It is accomplished through encryption.
33
It is an intrusion on network infrastructure. , The attacker first analyzes the environment and collects information in order to exploit the existing open ports or vulnerabilities. , An attack can be performed either from outside of the organization by an unauthorized entity or from within the company by an “insider” that already has some access to the network.
34
Snooping
35
Traffic Analysis
36
Modification
37
Masquerading
38
Replaying
39
Repudiation
40
Denial of Service (DoS)
41
Network sniffing (packet sniffing)
42
Spoofing
43
IP address spoofing
44
ARP spoofing
45
DNS spoofing
46
Man-in-the-middle (MITM) attack
47
Denial-of-Service (DoS)
48
Trojan horse
49
Session hijacking
50
Phishing
51
Encryption
52
Ciphertext
53
Encryption Algorithm
54
Decryption
55
Cryptosystem
56
Cryptography
57
Cryptanalysis
58
Cryptology
59
key
60
Symmetric Cryptosystems
61
Public-Key Cryptosystems (or Asymmetric Cryptosystems)