1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gregori [183]
3 years ago
10

When you make a purchase over the internet, your sensitive traffic is almost always protected by?

Computers and Technology
1 answer:
beks73 [17]3 years ago
4 0
It is almost always protected by ssl (secure sockets layer) ,it was later called tls (transport layer security) by the IETF , so if you see https in your url bar , then you're safe , if not then dont purchase off that site
You might be interested in
The actual database of active directory shared resources is stored on one or more computers designated as:
Mila [183]

Solution:

It is done by Native Os X command line tool that can do this.

Active Directory, the data store contains database files and processes that store and manage directory information for users, services, and applications. A copy of the data store runs on each domain controller in the forest. The Active Directory data store is often referred to as the directory.

The ideal environment for the data store includes the following:

A domain controller running an operating system in the Windows Server 2003 family and containing hardware that meets the minimum hardware requirements of the edition of the operating system (Windows Server 2003, Standard Edition; Windows Server 2003, Enterprise Edition; or Windows Server 2003, Datacenter Edition)

For environments consisting of multiple domain controllers, the presence of a fully functioning Active Directory replication topology

For environments consisting of multiple domain controllers, the presence of a fully functioning File Replication Service (FRS) topology

A regular backup schedule

Regular monitoring of Active Directory, either through manual review of event logs or through an automated monitoring solution, such as Microsoft Operations Manager (MOM)

This is the required description describes the elements of the Active Directory data store, including its architecture, protocols, interfaces, logical structure, physical structure, processes and interactions, and network ports.


6 0
3 years ago
Which term describes the order of arrangement of files and folders on a computer?
Pani-rosa [81]

Answer:The term that describes the order of arrangement of files and folders on a computer is organization. It is very important the organization of the files and folders to be effective, in order to work with them quickly and efficiently

Explanation:

hope this help sry if it doesn't.

5 0
3 years ago
What is an indication that malicious code is running?
tatyana61 [14]

Answer:

If you are running Windows check task manager and see if any background process if running if there is a background process of command prompt or powershell, there is a chance that there is a backdoor running in your system, you can just right click and end the task it should just kick the hacker off the server.

please give brainliest

7 0
3 years ago
I will give brainliest!!!!! I NEED HELP ASAP!!!!!!!
klemol [59]

Answer:

I'm pretty sure it's the first answer.

4 0
3 years ago
In this lab you will write a C program to sort an array of strings. The program will: Create an array of 50 strings; each string
andrezito [222]

Answer:

See explaination

Explanation:

#include <stdio.h>

#include <stdlib.h>

#include <string.h>

void swap(char *arr[], int i, int minIdx)

{

char temp[30];

strcpy(temp, arr[i]);

strcpy(arr[i], arr[minIdx]);

strcpy(arr[minIdx], temp);

}

void sort(char *arr[], int n)

{

for (int i = 0; i < n - 1; i++)

{

int minIdx = i;

int minV = 10000;

char min[30];

strcpy(min, arr[i]);

for (int j = i + 1; j < n; j++)

{

int a = strcmp(min, arr[j]);

if (a < 0)

{

strcpy(min, arr[i]);

minIdx = j;

}

}

swap(arr, i, minIdx);

}

}

void print(char *arr[], int n)

{

for (int i = 0; i < n; i++)

printf("%s", arr[i]);

}

void read(char *arr[], int *n)

{

FILE *file = fopen("strings.dat", "r");

char line[30];

*n = 0;

printf("Reading from file...\n");

while (fgets(line, 30, file))

{

strcpy(arr[(*n)++], line);

}

print(arr, *n);

}

int main(int argc, char const *argv[])

{

char *arr[50];

for (int i = 0; i < 50; i++)

arr[i] = (char *)malloc(sizeof(char) * 30);

int len;

int n = 0;

read(arr, &n);

printf("\n-------------------------\nAfter sorting\n");

sort(arr, n);

print(arr, n);

}

6 0
3 years ago
Other questions:
  • Write the interface (.h file) of a class GasTank containing: A data member named amount of type double. A data member named capa
    13·1 answer
  • Type of malware that is spread when you distribute
    12·1 answer
  • What does ascii stand for?
    14·2 answers
  • What will happen if a user clears the analytics cookie from their browser?
    7·1 answer
  • To provide both encryption and integrity protection, wpa2 uses aes encryption with:
    12·1 answer
  • Steve adds a second 1-GB 240-pin DIMM to his PC, which should bring the total RAM in the system up to 2GB. The PC has an Intel C
    9·1 answer
  • Which term describes an approach to security similar to defense in depth in that it supports multiple layers, but uses a differe
    14·1 answer
  • In QBasic, create a number guessing challenge. Your program should generate a random number from 1-
    9·1 answer
  • Draw the final structure that will house the electronic system​
    15·1 answer
  • When should you use an ELIF statement?<br> Edhesive
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!