1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
loris [4]
2 years ago
8

What type of trust model is used as the basis for most digital certificates used on the internet?

Computers and Technology
1 answer:
vesna_86 [32]2 years ago
3 0

The type of trust model that is used as the basis for most digital certificates used on the internet is known to be option B. distributed trust.

<h3>What is the trust model of the Internet?</h3>

The trust model of the internet is known to be one that is made up of tradeoffs.

Note that Distributed trust is seen as the system that is made up of transactions and it is one that is backed up by an extended community and onw where there is no trusted third parties.

Hence, The type of trust model that is used as the basis for most digital certificates used on the internet is known to be option B. distributed trust.

See full question below

What type of trust model is used as the basis for most digital certificates used on the Internet?

A. third-party trust

B. distributed trust

C. related trust

D. managed trust

Learn more about digital certificates from

brainly.com/question/24931496

#SPJ1

You might be interested in
True or false? To help improve SEO, your URL should match the title of your blog post, word for word.
Vsevolod [243]

Improving SEO, by ensuring the URL matches the title of your

blog post, word for word is False.

<h3>What is SEO?</h3>

This is referred to as Search engine optimization. It is used to

improve a site by ensuring that is more visible when people

search for certain things or words.

The URL should contain only key words and unnecessary ones

should be eliminated which is why it isn't compulsory for the title

to be word for word.

Read more about Search engine optimization here brainly.com/question/504518

7 0
3 years ago
Given a Student class, create a class with following characteristics:
Kay [80]

Answer:

ssume that,

Maximum “students” count can be 10.

*Driver Class*

*Solution class*

import java.util.*;

class Student {

private String name;

private int rollNo;

public String getName() {}

public void setName(String name) {}

public int getRollNo() {}

public void setRollNo(int rollNo) {}

};

class ClassRoom {

private int i;

private Student[] students;

public void addStudent(String name, int rollNo) {}

public Student[] getAllStudents() {}

};

8 0
3 years ago
Which of the following is based on the visibility and location of an object’s features?
grandymaker [24]

Answer:

The answer is Lines.

Explanation:

A visible line, or object line is a thick continuous line, used to outline the visible edges or contours of an object. A hidden line, also known as a hidden object line is a medium weight line, made of short dashes about 1/8” long with 1/16”gaps, to show edges, surfaces and corners which cannot be seen.

7 0
3 years ago
Hey plz help me with this<br>What is malware short for?​
soldier1979 [14.2K]

Answer:

Malware is the collective name for a number of malicious software variants, including viruses, ransomware and spyware. Shorthand for malicious software, malware typically consists of code developed by cyberattackers.

Explanation:

4 0
3 years ago
Which protocol below is used to email clients to send email
AVprozaik [17]

The Internet Message Access Protocol (IMAP) is a mail protocol used for accessing email on a remote web server from a local client. IMAP and POP3 are the two most commonly used Internet mail protocols for retrieving emails

4 0
3 years ago
Other questions:
  • Thomas Hill claims that a fruitful way to think about the badness of destroying the environment is
    15·1 answer
  • A _____ is a predefined text format that includes multiple formatting options.
    14·1 answer
  • Why did latex replace wax?
    7·1 answer
  • Which tasks can be completed using the Chart Tools Design tab? Check all that apply.
    5·1 answer
  • When specifying keywords to conduct an internet search, which of the following parts of speech will be the most useful??
    6·1 answer
  • A 9-year old male castrated Westie presents on emergency after being rescued from a house fire. On presentation, the dog has a r
    9·1 answer
  • Question #5
    14·1 answer
  • Laura is filming a scene in which the subject is sitting with a lit fireplace behind him. The only other source of light in the
    15·1 answer
  • b. Write a complete program for the following situation related to setting the speed of a car to preset values before starting a
    5·1 answer
  • Please help me i’ll give you brainlist
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!