You can attach images, spreadsheet files, documents, charts, and other types of supported files to the records in your database, much like you attach files to an e-mail message
Indicate whether the statement is true or false
TRUE
You might also like to view...
You may save your Web page as ________ if you want to reduce the file size and Word editing options
Fill in the blank(s) with correct word
?Match each correct item with the statement below.
A. ?A method used by wireless stations to detect the presence of an access point. Using this method, the station issues a probe to each channel in its frequency range and waits for the access point to respond. B. An attack in which a Bluetooth connection is used to download data from a device without the owner's permission.? C. An 802.11 frame type that is responsible for carrying data between stations. Two other frame types include management frames, which are involved in association and reassociation, and control frames, which are related to medium access and data delivery.? D. ?In the context of wireless signal propagation, the phenomenon that occurs when an electromagnetic wave encounters an obstruction and splits into secondary waves. The secondary waves continue to propagate in the direction in which they were split. E. The throughput experienced at the application level, such as the quality of a video feed or the speed of a Web page loading in the browser.? F. A type of antenna that issues and receives wireless signals with equal strength and clarity in all directions. This type of antenna is used when many different receivers must be able to pick up the signal, or when the receiver's location is highly mobile.? G. A type of antenna that issues wireless signals along a single direction, or path. Also called a directional antenna.? H. The use of chalk to draw symbols on a sidewalk or wall within range of an access point. The symbols, patterned after marks that hobos devised to indicate hospitable places for food or rest, indicate the access point's SSID and whether it's secured.? I. The act of driving around an area while running a laptop configured to detect and capture wireless data transmissions.? J. ?A security exploit in which a WPS PIN is discovered by means of a brute force attack, giving the attacker access to the network's WPA2 key. The PIN feature in WPS should be disabled if possible.