1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paraphin [41]
4 years ago
10

Which ipsec subprotocol provides data encryption?

Computers and Technology
1 answer:
Mrac [35]4 years ago
6 0
I'm not sure but I think LastPass?
You might be interested in
What is the long tube on a microscope called​
tatyana61 [14]

Answer:

I believe you are referring to the <u>Eyepeice.</u>

Explanation:

3 0
3 years ago
This OS was basically an upgrade to Windows 98 that was designed for home users.
matrenka [14]

<u>Answer:</u>

<em>Windows ME</em>

<u>Explanation:</u>

In the word Windows Me, Me stands for Milleneum. It is GUI based OS developed by Microsoft Corporation. <em>This is the first Home computer OS and it had IE 5.5, WMP version 7, etc. </em>

But this was not that much successful and this was the last OS released for Windows 9X series. Though its GUI based, it still looks like DOS OS only.

<em>The successor of this is Windows XP which became very popular and it was used by many computer users and it included windows NT Kernel.</em>

5 0
3 years ago
In a(n) _________ program a student must pass an exam at the end of the course with a 3out if 5 in order to get college credit.
zlopas [31]

Answer:

Its an AP program.

Explanation:

7 0
3 years ago
Read 2 more answers
Which TWO of the following are input devices that are parts of a laptop computer?
vampirchik [111]

Answer:

Mouse and Keyboard.

3 0
3 years ago
Read 2 more answers
How does setting user permissions increase the security of a system?
leonid [27]

Answer: This can allow for less hackers to acquire your most essential and private information. It will be kept private to you and only others you share with.

Explanation: For example, if I wanted to edit a document without being given the consent to do so this will breach the security of user permissions, but if the individual was to set the document to view only, I would not have access to edit or even change little aspects of it.

3 0
3 years ago
Other questions:
  • A certain social media Web site allows users to post messages and to comment on other messages that have been posted. When a use
    10·1 answer
  • Which of the following assumes that the repair will happen just as the technician stated?
    9·1 answer
  • What directory under / contains the log files and spools for a linux system?â?
    13·1 answer
  • When you don't have enough room to stop, you may _______ to avoid what's in front of you. A. speed up B. steer away C. brake
    7·2 answers
  • What is the first step that you should undertake when performing a visual analysis of a work of art?
    6·2 answers
  • Question #4
    5·2 answers
  • A professional bureaucracy is a knowledge-based organization where goods and services depend on the expertise and knowledge of p
    7·1 answer
  • What should an administrator use to more easily assign database access permissions to multiple users?
    6·1 answer
  • With the Linux operating system, it’s open source design means it can be used, modified and _____ freely.
    15·2 answers
  • 5. What are some situations where you might find it useful to use the “!” symbol in a program?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!