1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DerKrebs [107]
3 years ago
12

Which process is used to protect transmitted data in a vpn?

Computers and Technology
1 answer:
wlad13 [49]3 years ago
3 0
Here is the answer: <span>Tunneling</span>
You might be interested in
Given an int variable k, an int array incompletes that has been declared and initialized, an int variable studentID that has bee
Feliz [49]

Answer:

check the explanation

Explanation:

Variables when it comes to programming are used to store data to be documented and manipulated in a computer program. They can also be used for labeling stored data with a descriptive name and any other needed details, so that the programs can be comprehended more understandably by the reader and ourselves.

to solve the question, we will write this set of codes;

numberOfIncompletes = 0;

for(k = 0; k < incompletes.length; k++)

{

       if(incompletes[k] == studentID)

           numberOfIncompletes++;

}

7 0
3 years ago
Which of the following offers more reliable antivirus protection? Question 43 options: A) antivirus software on user PCs B) anti
marissa [1.9K]

The option which offers more reliable antivirus protection is an installation of: B) antivirus software on the mail server.

<h3>What is an antivirus?</h3>

An antivirus can be defined as a software application that is designed and developed to prevent, scan, detect, delete and protect a computer from viruses and malwares that are capable of infecting and destroying both system and user files.

In this context, the option which offers more reliable antivirus protection is an installation of antivirus software on the mail server, rather than on user PCs.

Read more on antivirus here: brainly.com/question/17209742

#SPJ1

5 0
1 year ago
What are some other ways to program a robot to navigate a complicated environment other than straight paths and right angle (90
Ann [662]

Explanation:

its too old question bro I can't answer just for points

6 0
2 years ago
BRAINLIEST You have a small company and want to keep your costs low, but it is important your employees share data. Which networ
solmaris [256]

Answer:Peer-to-peer

Explanation: I hope this helps

5 0
2 years ago
Read 2 more answers
________ is a set of rules for exchanging files such as text, graphic images, sound, video, and other multimedia files on the we
Soloha48 [4]
<span> HYPERTEXT TRANSFER PROTOCOL  (HTTP)</span>
3 0
3 years ago
Other questions:
  • Compare the logical link control and the media access control. Which of the following is a correct statement?
    7·2 answers
  • Uses of computer in daily life
    9·2 answers
  • True / False<br> The exponent in floating point is stored as a biased value.
    9·1 answer
  • You can combine the algorithms for converting between infix to postfix and for evaluating postfix to evaluate an infix expressio
    13·1 answer
  • What is the Gain (dB) of a transmission if the Maximum Data Rate is 1 Gbps and the Bandwidth =7000 MHz? Group of answer choices
    6·1 answer
  • Several disaster relief nonprofits want to create a centralized application and repository of information so that they can effic
    7·1 answer
  • Help a brotha out..................
    10·1 answer
  • Answer if you know Javascript, html, css, python, and Ruby.
    12·1 answer
  • You have two identical print devices that are set up in a work room. Currently, the Windows print server has two printers config
    13·1 answer
  • Which of the following is not considered essential for an electronic device to be called a computer?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!