1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DerKrebs [107]
3 years ago
12

Which process is used to protect transmitted data in a vpn?

Computers and Technology
1 answer:
wlad13 [49]3 years ago
3 0
Here is the answer: <span>Tunneling</span>
You might be interested in
Which of the following is not a benefit of shaping data with the Power Query Editor?
algol13

Answer:

A

Explanation:

I am not 100% sure but without the shaping data, data can still be merged from multiple sources.

3 0
2 years ago
List five applications field of a computer?​
True [87]

list five applications field of a computer?

answer= <em> </em><em>home</em><em> </em><em>,</em><em> </em><em>school</em><em>,</em><em> </em><em>h</em><em>o</em><em>spital</em><em>,</em><em> </em><em>bank</em><em>,</em><em> </em><em>super</em><em> </em><em>markets</em><em>,</em><em> </em><em>etc</em><em>.</em><em>.</em><em>.</em><em>.</em>

5 0
3 years ago
Choose the answer. Janice's IT department found that her computer had a program on it that was collecting her personal informati
harkovskaia [24]

Answer:

Spyware

Spam is just unwanted soliciation, spoofing is making links appear as something else, pharming is creating a fake website for victims to use.

7 0
2 years ago
What is a programming language?
xenn [34]
D is the answer cause coding
5 0
3 years ago
Read 2 more answers
HELP I WILL GIVVE BRAINLY AND 15 POINTS
levacccp [35]

Answer:

Because someone was hittting the space bar in the message instead of typing letters and numbers

Explanation:

Because they were bored or it was a glitch

4 0
3 years ago
Other questions:
  • Tom only thinks about his own gain and does not care about the team objectives. What quality is he demonstrating? A. resourceful
    9·1 answer
  • If a cache access requires one clock cycle and dealing with cache misses requires an additional five clock cycles, which of the
    9·1 answer
  • Name size of machine screw that is used to secure switches and receptacles to device boxes
    13·1 answer
  • We never need to use a forward declaration when invoking a public subprogram. true or false?
    15·1 answer
  • What are the two main things an operating system does?
    14·1 answer
  • A two-dimensional array of characters can contain Group of answer choices
    11·1 answer
  • The function below takes two arguments, a dictionary called dog_dictionary and a list of dog names (strings) adopted_dog_names.
    8·1 answer
  • Use your editor to open the cc_data.js file and study the data stored in the staff object to become familiar with its contents a
    6·1 answer
  • How to use 2 tabs at once on my Lenovo yoga book?​
    9·1 answer
  • Define a python functions that draw a pinwheel using the pinwheel function that has input paramiters that allows you to change t
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!