One type of security for wireless networks involves entering a list of the MAC addresses for the devices that are allowed to access the network and excluding all others. This is called MAC ____________.

Fill in the blank(s) with the appropriate word(s).

filtering

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1) Placing data on a stack is called popping the stack. 2) Removing data from a stack is called popping the stack. 3) There is no need for error checking when popping a stack. 4) There is no need for error checking when pushing a stack. 5) Data is inserted into a queue at the back.

Computer Science & Information Technology

When working with queries, viewing a query in Datasheet View is the same as running the query.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology