1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
7nadin3 [17]
2 years ago
7

) Recall that TCP has no security. If an application author wants to pass his messages to another process that can encrypt them,

at what layer will that encryption (like TLS or SSL) be found?
Computers and Technology
1 answer:
emmainna [20.7K]2 years ago
8 0

Answer:

The explanation for the following question is described in the explanation section below.

Explanation:

Even though TCP seems to have no authentication, if an applicator decides to transfer its signals or messages to some other mechanism that can encrypt them, instead Transport Layer is perhaps the layer where encryption was located.

  • This layer protection is an acceptable use policy that promotes security and authentication when exchanging information.
  • TLS would be the authentication protocol where authentication is done whenever the sender wishes to transfer his information to another mechanism that can encrypt itself.
You might be interested in
Compare the applications below:
Karo-lina-s [1.5K]
The answer is the first response, by order of elimination, you can eliminate the rest.

HTML is a programming language that is used to design websites. You don't need to program a website to make a post on instagram, especially if you are using the app.

If you check the app store on your phone, you can find instagram in the app store, which lets you access it from your mobile device. Thus, the third option is wrong.

Finally, just read the description of instagram. It was made for sharing pictures, so the last option is wrong.
3 0
3 years ago
Decimal numbers are based on __________.
MaRussiya [10]
They are based on 10 digits.

I’m not sure.
8 0
3 years ago
Read 2 more answers
In preparing categorical variables for analysis, it is usually best to a. combine as many categories as possible. b. convert the
Genrish500 [490]

Answer:

In the given question the correct option is missing, which can be described as follows:

"It transforms binary, null variables into the groups."

Explanation:

These variables are real variables, which could also take up a series of variables, that are either constrained or defined. This can be regarded as a listing. It is used to analyze and convert it, into binary in the following ways, and wrong choices can be described as follows:

  • In option a, It can't combine, it only converts.
  • Option b and Option c is wrong because, it can't convert numeric, it only convert binary number to dummy variables.

5 0
3 years ago
Can anyone tell me what wrong with this code the instructions are "Currently, this program will add 6 and 3 together, output the
atroni [7]

Answer:

import random

a = random.randint(1,10)

b = random.randint(1,10)

answer = a * b

print(str(b)+" * "+str(a)+" = "+str(answer))

Explanation: So I am guessing you are on Edhesive Module 2.5 Intro to cs. Sorry it took so long but hopefully this works.

4 0
3 years ago
Xavier composed an email message using a webmail application. Listed below are the different elements that Xavier used in his em
dusya [7]
E., sentence casing.
3 0
3 years ago
Read 2 more answers
Other questions:
  • What is an activity that can help you enhance the appearance of your computer’s desktop?
    12·2 answers
  • After correctly configuring a new wireless enabled thermostat to control the temperature of the company's meeting room, Joe, a n
    6·1 answer
  • Assume that speed = 10 and miles = 5. What is the value of each of the
    9·1 answer
  • as the reader, you can figure out the writer's ____ based on his or her word choice and sentence structure a. purpose b. audienc
    11·1 answer
  • A contiguous subsequence of a list S is a subsequence made up of consecutive elements of S. For example, if S is 5,15,-30,10,-5,
    12·1 answer
  • Can someone please help with one? I will mark brainlest!!!
    5·2 answers
  • Which is the best response to receiving a threating text from a classmate
    11·2 answers
  • ISO 400 is twice as sensitive and ISO 100 true or false
    7·1 answer
  • Which of the following are responsibilities of information security management? Defining the protection required for systems and
    14·1 answer
  • What three best practices can help defend against social engineering attacks?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!