1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexdok [17]
3 years ago
14

Which osi model layer manages data encryption?

Computers and Technology
1 answer:
Hoochie [10]3 years ago
7 0
The presentation Layer manages data encryption.
You might be interested in
On what dates did the 2016 Olympics take place( list all)
kow [346]
Hi!

The 2016 Olympics took place from August 5th, 2016 - August 21st, 2016.
3 0
3 years ago
Read 2 more answers
Complete the body of the decrement static method using only the NaturalNumberKernel methods (multiplyBy10, divideBy10, and isZer
Ivan

Answer:true

Explanation:mark as brainliest

6 0
3 years ago
I want to discard my old computer and securely erase the data from my hard drive.
FrozenT [24]
Wipe off the hard drive with a software eraser but it won't be quick and won't work on defective disks
3 0
3 years ago
Xbrl taxonomy: is the document format used to produce web pages. is the final product (report. is a classification scheme. is a
frosja888 [35]
The answer to this is "is a classification scheme"..hope that helped
3 0
3 years ago
Refer to the color wheel to identify the color scheme.
morpeh [17]
C) monochromatic
Hope this helps!

btw make me brainliest?
4 0
3 years ago
Other questions:
  • Descending selection sort with output during execution
    6·1 answer
  • The picture that graphically represents the items you use in Windows is called a/an
    12·2 answers
  • Explain how to identify a starting position on a line.
    15·2 answers
  • The control programs managing computer hardware and software perform the _________ function to control and prioritize tasks perf
    8·1 answer
  • In regard to protective actions for explosive devices, the area where the blast originates is referred to as ___________ perimet
    8·1 answer
  • How is DATA sent across a Network?
    7·1 answer
  • Which person would be the best fit for a career in the Information Technology field?
    6·2 answers
  • 1. Software that is designed to intentionally cause harm to a device, server, or network is A. outware B.loggerware C.
    12·1 answer
  • Name any three areas of of application of excel.
    12·1 answer
  • Which option is typically only used when utilizing self joins?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!