Relational databases are heavily based on the mathematical concept of:
A) Set Theory.
B) Bet Theory.
C) Get Theory.
D) Met Theory.
Question 2
In 802.11i, ________ authentication always uses SSL/TLS.
A) inner
B) outer
C) Both A and B
D) Neither A nor B