1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitrij [34]
4 years ago
14

"which term is used to describe the process of encasing one protocol or packet inside another protocol or packet

Computers and Technology
1 answer:
svlad2 [7]4 years ago
7 0
<span>tunneling Term used 
process of encasing one protocol or packet inside another protocol or packet</span>
You might be interested in
What type of edge does UML use to denote interface implementation? Group of answer choices A dotted arrow from the interface to
Feliz [49]

Answer:

<em>A. A dotted arrow from the class to the interface terminated with a triangular tip</em>

Explanation:

3 0
3 years ago
What type of system security malware allows for access to a computer, program, or service without authorization?
olasank [31]

Answer:

"backdoor" is the correct answer for the above question

Explanation:

  • The backdoor is a type of attack which is done by the type of backdoor programs to remotely access the computers without the authorization of the user of the computer.
  • It is inserted on the computer with the help of the internet and accessed the computer without using authorization techniques.
  • The above question asked about the virus which is used to access the computer without the permission of the right use of the system. Hence the answer is backdoor which is defined above.
7 0
3 years ago
The components of hardware include:
zlopas [31]

Answer:

A

Explanation:

Monitor, CPU, Disk Drives, Printer, Keyboard/mouse

5 0
3 years ago
Read 2 more answers
You are planning to help students learn to program in Python. Some of the steps are below, but not in any particular order.
MatroZZZ [7]

The steps learn to program in Python are:

  • Define your objectives.
  • Define use case(s).
  • You draw mock-ups..
  • User enters a topic..
  • You show how each screen flows to the other screens,
  • Wireframe your app

<h3>How do one run Python on your computer.</h3>

One can do so by the us of Thonny IDE which one needs to run the installer on ones computer then one goes to  File and then a person can write Python code in the file and save it and later run it

Note that The steps learn to program in Python are:

  • Define your objectives.
  • Define use case(s).
  • User enters a topic, the app switches to a screen with an explanation. This app will help users learn to program Python. On that screen, the user can choose to see sample code.
  • You draw mock-ups of each screen and identify the input-process-output for each screen.
  • You show how each screen flows to the other screens
  • Wireframe your app.

Learn more about Python from

brainly.com/question/26497128

#SPJ1

4 0
2 years ago
How are authentication and authorization alike and how are they different? what is the relationship, if any, between the two\?
Helen [10]
  Both authentication and authorization are terms used in information security and <span>intelligently controlling access to </span>computer<span> resources. </span><span>Authentication is the process where by an individual’s (user's) identity is confirmed, whereas authorization is the association of that identity with rights/</span>privileges and permissions to resources related to information security.

3 0
3 years ago
Read 2 more answers
Other questions:
  • HELP!!!! I need this ASAP
    9·1 answer
  • What is the device called which typically combines the capabilities of a scanner, printer, fax, and copying machine?
    15·1 answer
  • Dolphin Tecx is a new tech company that just issued smart watches to its
    9·1 answer
  • Which of the following is NOT a logical operator (logical connective)?
    5·1 answer
  • For this lab, youhave to write a programnamedseriesFunction.cthat prompts user to enter two values, x and n. Then it would use a
    11·1 answer
  • It's safe to download files from the internet if u perform regular Windows security updates, that is all u need to protect your
    10·2 answers
  • What export format is a great option for students that want to put their video into an online portfolio?
    8·1 answer
  • Which guideline would not promote energy conservation?
    15·1 answer
  • Write a MY SQL query to display the name and hire date of all employees who were hired in 1992.
    9·1 answer
  • A)​What would be the state of the following list after each of the first four passes in a Bubble sort, sorting into ascending se
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!