1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DerKrebs [107]
3 years ago
12

Which process is used to protect transmitted data in a vpn?

Computers and Technology
1 answer:
wlad13 [49]3 years ago
3 0
Here is the answer: <span>Tunneling</span>
You might be interested in
One purpose of the dual ignition system on an aircraft engine is to provide for?
Gnom [1K]
It is done to provide for better engine performance. It is important for two main reasons. One is that if one ignition system fails the other can for a time take care of it and hold its ground until you land or fix it. Another is that it is used for more efficient consumption of fuel and air which makes the engine work better.
7 0
3 years ago
Read 2 more answers
You are testing the user experience.
Crazy boy [7]

Answer:

You can answer this very easily by considering which of the circumstances affect the end user and which affect the developer:

1) Didn't use comments in the code

- affects developers

2) User complaints about language used in the program

- affects users

3) The variables have meaningless names

- affects developers

4) The program should have used a loop

- affects developers

5) The numeric results are incorrect

- affects users

Your answers then are 2 and 5, spoken languages and incorrect output will very much affect the user experience.

5 0
3 years ago
Read 2 more answers
A term to describe articles that can be displayed in their entirety,as opposed to abstract and references only
babunello [35]

Answer:

Full Record - A screen containing complete or detailed citation information which may include a summary or abstract. Full Text - A term to describe articles that can be displayed in their entirety, as opposed to Abstract and References only.

Explanation:

5 0
3 years ago
Which is a description of phishing?
kodGreya [7K]

Answer:

C. sending emails impersonating legitimate companies in an attempt to learn a recipient's personal information

7 0
3 years ago
Identify the careers that require a college degree
Vikentia [17]
Doctor or teacher or an engineer

8 0
3 years ago
Other questions:
  • Which of the following is not considered as part of technology literacy?
    8·1 answer
  • What are some options available in the Spelling and Grammar Checker? Check all that apply. Change and Change All Redo and Repeat
    15·2 answers
  • Mark is flying to Atlanta. The flight is completely full with 200 passengers. Mark notices he dropped his ticket while grabbing
    15·1 answer
  • How do I contact an admin
    8·1 answer
  • Who are the following furries?
    10·2 answers
  • What would give Lucy, an entry-level candidate, an edge over others while she seeks a programmer’s position? Lucy, an entry-leve
    11·1 answer
  • what is cicada 3301? i will give brainliest if you give me a correct answer (not copy and pasted) and somewhat well detailed, i
    8·1 answer
  • SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SU
    6·2 answers
  • What is the name of the directory that contains symbolic links to unix sysv rc scripts for runlevel 2?
    5·1 answer
  • Data security issues that must be addressed by hipaa implementation teams include:__________
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!