1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gregori [183]
3 years ago
10

When you make a purchase over the internet, your sensitive traffic is almost always protected by?

Computers and Technology
1 answer:
beks73 [17]3 years ago
4 0
It is almost always protected by ssl (secure sockets layer) ,it was later called tls (transport layer security) by the IETF , so if you see https in your url bar , then you're safe , if not then dont purchase off that site
You might be interested in
You entered the following line of code in IDLE.
AlexFokin [52]

Guess is a string. By default the input function returns string types.

8 0
4 years ago
Read 2 more answers
What is the best method to avoid getting spyware on a machine
monitta

Answer: The best method to avoid getting spyware on a user machine is to download software only from trusted websites. And depending on the machine it might say that "This download you are about to install might have spyware or malware and it might infect your laptop" "Do you wish to continue?"

3 0
3 years ago
Which is an example of artificial intelligence in computers? A. multimedia software B. encryption software C. voice recognition
andrezito [222]

Answer:

its option b encryption software

Explanation:

Artificial intelligence (AI) is intelligence demonstrated by machines, unlike the natural intelligence displayed by humans and animals, which involves consciousness and emotionality. The distinction between the former and the latter categories is often revealed by the acronym chosen. 'Strong' AI is usually labelled as AGI (Artificial General Intelligence) while attempts to emulate 'natural' intelligence have been called ABI (Artificial Biological Intelligence). Leading AI textbooks define the field as the study of "intelligent agents": any device that perceives its environment and takes actions that maximize its chance of successfully achieving its goals.[3] Colloquially, the term "artificial intelligence" is often used to describe machines (or computers) that mimic "cognitive" functions that humans associate with the human mind, such as "learning" and "problem solving".

3 0
3 years ago
Putting commands in correct order so computers can read the commands
lana66690 [7]

Answer:

its b I think I'm pretty sure

8 0
3 years ago
Enter the database function in cell i6 that determines the average salary of all full-time employees with at least one dependant
love history [14]

Based on the given spreadsheet, the database function that needs to be entered into cell I6 to find the average salary of all full-time employees is =AVERAGEIFS(D5:D34,B5:B34,"FT",C5:C34,">=1")

<h3>What does the AverageIfs formula find?</h3>

You can use the AverageIfs formula to find the average of a specific group of numbers from a spreadsheet based on the shared categories that these numbers fall under.

After typing in the =AverageIfs function, you then input the range from which the category will be specified. In this case that is D5:D34. The next entry would be the range the category is picked from which is  B5:B34. The function will be FT for Full time workers.

Then use C5:C34 to find out the number of dependents that are equal to or greater than 1.

The digit returned is the average salary of all full-time employees.

Find out more on the AverageIf function at brainly.com/question/13661607

#SPJ1

4 0
2 years ago
Other questions:
  • Consider this scenario: A major government agency experiences a data breach. As a result, more than 100,000 personal records are
    7·2 answers
  • What is requirement analysis
    8·1 answer
  • 2. a. Write pseudocode for a divide-and-conquer algorithm for finding valuesof both the largest and smallest elements in an arra
    11·1 answer
  • Which port-authentication network access control standard forces devices to go through a full authentication, authorization, and
    13·1 answer
  • A user calls the help line and ask for some help installing a new keyboard. He isn't sure how to plug the keyboard into the comp
    15·1 answer
  • Which of these are forms of data? Check all that apply.
    8·2 answers
  • how risk can impact each of the seven domains of a typical IT infrastructure: User, Workstation, Local Area Network (LAN), Local
    7·1 answer
  • First Computers and Technology question in 4 years..
    11·1 answer
  • What is the different sheets in excel
    15·1 answer
  • If you walked into a room containing three computers and were told one of them was infected with malware, how would you determin
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!