1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DerKrebs [107]
3 years ago
12

Which process is used to protect transmitted data in a vpn?

Computers and Technology
1 answer:
wlad13 [49]3 years ago
3 0
Here is the answer: <span>Tunneling</span>
You might be interested in
What is a stored​ procedure?
pshichka [43]

Answer:

The right answer is Letter B. It is an area of memory that is used for dynamic memory allocation.

Explanation:

<em>Because a store procedure is not a computer program,neither a computer software . It is a type of code or subroutine available to applications that access a relational database management system. Such procedures are stored in the database data dictionary. It serves to save time and memory, extensive  or complex processing that requires execution of several SQL. </em>

6 0
3 years ago
​your business has a web server that has suddenly become unresponsive. when you study the server's logs there are a huge number
kvasek [131]
there's a chance the web server could quite possibly be backed up from all the requests and not being cleaned or updated often
8 0
2 years ago
Read 2 more answers
PLEASE HELP!!! 18 points
sdas [7]

Answer:

Vertigo                                            |     1958 |      128 | English         | 1958-08-24 | UK

   902 | The Innocents                                      |     1961 |      100 | English         | 1962-02-19 | SW

   903 | Lawrence of Arabia                                 |     1962 |      216 | English         | 1962-12-11 | UK

   904 | The Deer Hunter                                    |     1978 |      183 | English         | 1979-03-08 | UK

   905 | Amadeus                                            |     1984 |      160 | English         | 1985-01-07 | UK

   906 | Blade Runner                                       |     1982 |      117 | English         | 1982-09-09 | UK

   907 | Eyes Wide Shut                                     |     1999 |      159 | English         |            | UK

   908 | The Usual Suspects                                 |     1995 |      106 | English         | 1995-08-25 | UK

   909 | Chinatown                                          |     1974 |      130 | English         | 1974-08-09 | UK

   910 | Boogie Nights                                      |     1997 |      155 | English         | 1998-02-16 | UK

   911 | Annie Hall                                         |     1977 |       93 | English         | 1977-04-20 | USA

   912 | Princess Mononoke                                  |     1997 |      134 | Japanese        | 2001-10-19 | UK

   913 | The Shawshank Redemption                           |     1994 |      142 | English         | 1995-02-17 | UK

   914 | American Beauty                                    |     1999 |      122 | English         |            | UK

   915 | Titanic                                            |     1997 |      194 | English         | 1998-01-23 | UK

   916 | Good Will Hunting                                  |     1997 |      126 | English         | 1998-06-03 | UK

   917 | Deliverance                                        |     1972 |      109 | English         | 1982-10-05 | UK

   918 | Trainspotting                                      |     1996 |       94 | English         | 1996-02-23 | UK

   919 | The Prestige                                       |     2006 |      130 | English         | 2006-11-10 | UK

   920 | Donnie Darko                                       |     2001 |      113 | English         |            | UK

   921 | Slumdog Millionaire                                |     2008 |      120 | English         | 2009-01-09 | UK

   922 | Aliens                                             |     1986 |      137 | English         | 1986-08-29 | UK

   923 | Beyond the Sea                                     |     2004 |      118 | English         | 2004-11-26 | UK

   924 | Avatar                                             |     2009 |      162 | English         | 2009-12-17 | UK

   926 | Seven Samurai                                      |     1954 |      207 | Japanese        | 1954-04-26 | JP

   927 | Spirited Away                                      |     2001 |      125 | Japanese        | 2003-09-12 | UK

   928 | Back to the Future                                 |     1985 |      116 | English         | 1985-12-04 | UK

   925 | Braveheart        

Explanation:

hope this helped please mark me branliest let me know if you have questions :)

5 0
3 years ago
Write keyboard shortcut to insert footnote and endnote​
loris [4]

Answer:

Alt + Ctrl + F to insert a footnote.

Alt + Ctrl + D to insert an endnote.

Correct me, if I am wrong :)

Have a great day!

Thanks!

5 0
2 years ago
The Gramm-Leach-Bliley Act contains a rule that ensures security and confidentiality of customer information, protects against a
ValentinkaMS [17]

Answer:

b. The Safeguards Rule

Explanation:

According to a different source, these are the options that come with this question:

a. The Information Assurance Rule

b. The Safeguards Rule

c. The Safety Rule

d. The Guardian Rule

This rule is called the <em>Safeguards Rule</em>, and it comes from the Gramm–Leach–Bliley Act (GLBA), also known as the Financial Services Modernization Act of 1999. This is an act of Congress signed by President Bill Clinton that removed barriers among banking companies, securities companies and insurance companies. This meant that organizations such as commercial banks, investment banks, securities firms, and insurance companies were able to consolidate.

7 0
3 years ago
Read 2 more answers
Other questions:
  • This type of server spools documents and puts them in a queue.
    12·1 answer
  • The first step in the five-step process for problem solving is to ____. evaluate take action understand the task or need complet
    10·2 answers
  • What does LMS Date Updated mean?
    9·1 answer
  • In step 2 of the mail merge process you must be prepared to
    6·2 answers
  • Your computer system is a participant in an asymmetric cryptography system. You've crafted a message to be sent to another user.
    13·1 answer
  • Adam is writing a program that: 1) has the user guess a number, and 2) tells the user how many guesses it took to get the correc
    9·2 answers
  • Which of the following describes the purpose of project management? planning and organizing resources to meet a goal arranging t
    15·1 answer
  • Hello,
    13·1 answer
  • Identify what algorithm or concept the following code relates to. void Sort(int array[], int tempArray[], int left, int right) {
    6·1 answer
  • I have no idea how to use the sep and end in Python can someone help me I have a test tomorrow
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!