1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
konstantin123 [22]
2 years ago
11

Your browser has blocked your from your crucial secure intranet sites. What could be the problem?.

Computers and Technology
1 answer:
Alenkinab [10]2 years ago
3 0

A browser is a program that allows and provides the user access to information and web pages on the internet. It blocks someone when their SSL certificate status has been voided.

<h3>What is an SSL certificate?</h3>

An SSL (Secure Sockets Layer) certificate is a digital code and certificate present on the web that authenticates and provides security for communication. It is a security protocol that allows encrypted transmission.

The firewall supervisor sets the rule to block or allow the users to connect to Crucial Secure Intranet Sites based on their SSL certificates. SSL certificate if gets revoked then does not allow users to reach the site and declares it to be a potential risk.

Therefore, the browser is not reachable when the SSL certificate gets expired.

Learn more about SSL certificates here:

brainly.com/question/24276018

#SPJ1

You might be interested in
What are ways to switch windows in Excel? Check all that apply. On the status bar, click the Windows button, and then click the
yulyashka [42]

On the status bar,Windows button, and then click the file name.click to display the Excel jump list, and then click the file name. On the View tab, in the Window group, click Switch Windows, and then click the file name. and also hint you can do alt tab  but alt first and then tab

8 0
3 years ago
PLEASEEEEE HELLPPP IT'S URGENT!!!
Usimov [2.4K]

Answer:

Battery: DC power source to feed electricity in the circuit

Processor: component that reads instructions from memory, executes them and writes result data to memory and output devices

Accelerometer: device that measures motion acceleration along 3 dimenstions

Micro USB Port: standard interface for serial communication and power

Compass: sensor that finds orientation based on earth's magnetic field

•Block Editor: pass

Iteration: one cycle of a program loop

•Selection: pass

Variable: program construct to hold a value that code can read and write to.

Algorithm: programming code with a particular function to transform a given input to an output

Debug: the process of finding and fixing mistakes in your program

4 0
3 years ago
What is it called when two different files generate the same hashing result?
IrinaK [193]
A Hash<span> Collision Attack is an attempt to find </span>two<span> input strings of a </span>hash<span> function that </span>produce the same hash result<span>. ... If </span>two separate<span> inputs </span>produce the same hash<span> output, it is </span>called<span> a collision. </span>
4 0
3 years ago
12) The Windows utility returns your computer to the state it was in when it came from the factory. Erase Refresh Reset Backup N
Ludmilka [50]

Answer:

Reset

Explanation:

3 0
3 years ago
When a new user visits your proprietary site, what is typically the first method of interaction with them
Olin [163]

Answer:

Log file entry notifying you of new user activity

Explanation:

Log files are records of the timeline of activities in a computer system. These files contain information about new users of a site as well as the activities they performed on the site.

The internet protocol address of the visitor, the time of visit, as well as the features clicked on, or accessed by him, example, videos or images are all registered in the log file. The owner of the site can use the information sourced from the log files to perform site analytics.

5 0
3 years ago
Other questions:
  • Type the correct answer in the box. Spell the word correctly.
    14·2 answers
  • One disadvantage of using the styles feature of a word processor is that you cannot modify existing styles. true or false
    14·1 answer
  • Which type of multiple inheritance does Java support?
    15·1 answer
  • Which of the following should you do first when planning your career
    11·1 answer
  • Two of the following tasks would most likely be completed by a biomedical engineer?
    7·1 answer
  • Which of the following sentences is correct?a. Arithmetic log unit is used to perform both integer and floating point computatio
    8·1 answer
  • The variables xp and yp have both been declared as pointers to integers, and have been assigned values. Write the code to exchan
    6·1 answer
  • Kathi, the owner of Klothes for Kats, is excited about the launch of her first Local Catalog ad. She remembers there are a few d
    6·1 answer
  • Define basic logical gates with its symbol, algebraic expression and truth table.​
    15·2 answers
  • Rajesh is considering whether to use a web app to collaborate with a group of friends on a project. What is one reason he should
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!