1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Goryan [66]
2 years ago
9

A virtual private network (VPN) is used to securely connect to another network over a insecure network.

Computers and Technology
2 answers:
andrew11 [14]2 years ago
6 0

Answer:

The answer is True.

Explanation:

<em>A Virtual Private Network is a type of network that allows computers and other devices to communicate with each other using encrypted connection over vulnerable or insecure network like the internet or public connections. The reason why it is secured because it used protocols or rules which every data is encrypted during its travel on the network. (Example: Upon sending, it is wrapped in codes, and upon receiving of the packets of data, a code must be provided to be able to download it). This is how the security of VPN works. Normally, companies are implementing this type of network to prevent unauthorized access or users to get their information.</em>

saul85 [17]2 years ago
3 0

Answer: True

Explanation:

You might be interested in
JAVA QUESTION::
allochka39001 [22]

Answer:

3) 44 10 44

Explanation:

Given data

int [] val = { 3, 10, 44 };

The total number of parameters of given array are 3, so total length of array is also 3.

The indexing of array starts with '0', Therefore the <u>indexes</u> of array with length zero are: {0,1,2}

The value of array at index 0 is = 3

similarly

value at index 1 = 10

value at index 2 = 44

Any value of index 'i' of an array is selected using array[i].

Therefore,

val[0] is selecting the value of array located at index '0'.

val[0] = 3

val[2] is selecting the value of array located at index '2'.

val[2] = 44

Finally,

val[0] = val[2]; is copying the value placed at index 2 (44) to value placed at index 0 (3). Hence, the output would be { 44 10 44}. So 3rd option is correct.

 

8 0
3 years ago
When was internet created in which year​
fiasKO [112]

Answer:

it was invented in 1983

3 0
3 years ago
Read 2 more answers
Identify possible advantages and disadvantages of using automatic withdrawal to pay bills
Aleonysh [2.5K]

advantages. discounts, builds credit, helps keep track on when you need to pay.

disadvantages. could overcharge if it doesn't have enough, could ruin credit, could jeopardize future loans

5 0
3 years ago
Read 2 more answers
A student is curious about how a Web site appears on his computer screen. On a piece of paper,
nata0808 [166]

A student is curious about how a Web site appears on his computer screen. There is a communication between the client and the server in the Application Layer.

Explanation:

  • When we choose to open a webpage (in any browser) the seventh layer of the OSI model - called Application layer will help to do that.
  • What happens after we write the webpage address in address bar is that the Application layer protocol (also called HTTP) formats and sends the request from the client's browser (Internet Explorer, Mozilla Firefox , Opera, Safari etc.) to the server.
  • It also formats and sends the server's respond back to client's browser. This process happens very fast and all the OSI model layers are processing in it (not only the Application layer).
  • All the layers are working together and each of them is responsible for some particular job, but all together they work as one. The layers communicate with each other and in case of error they will retry and fix the error or if they are unable to do it, the responsible layer will inform the user about the source of the problem.
  • What happens when page is requested and received? If we will remove the graphical and visual image and look at the process that computer does. We will see a set of commands, mathematical algorithms, symbols, letters and not understandable codes and processes.
  • When data is sent from "A" to "B", a transport layer is responsible to send and deliver it correctly and exactly the same, what was requested.
  • If the request, processed by "A" (sender) is too long, the transport layer will divide it in segments (called segmentation process) to understand well and not make a mistake while sending the data to "B" (recipient). After this process data is travelling through the network to the "B" (recipient), if the sent data is segmented or divided, the transport layer is responsible for reassemble it again and "B" (recipient) receives its requested data (It can be web page or other data).
  • If the transport layer will not do the segmentation process, then the next - network layer - will check the data and if the requested message is too long it will fragment it (called fragmentation process) and will provide the same as transport layer had to do.
  • All the layers processes are connected to each other and work cooperatively.
5 0
3 years ago
A programmer wants to determine whether a score is within 10 points of a given target. For example, if the target is 50, then th
Kipish [7]

Answer:

(target - 10 ≤ score) AND (score ≤ target + 10)

Explanation:

8 0
2 years ago
Other questions:
  • How many rows and columns does ms-excel 2007 have???
    10·1 answer
  • Company policies require that all network infrastructure devices send system level information to a centralized server. Which of
    6·1 answer
  • A third-grade teacher at Potter Elementary School wants a program that allows a student to enter the amount of money a customer
    14·1 answer
  • Which party controlled the White House and politics in the late 1800s, except for Grover
    6·2 answers
  • Graphic software task​
    7·1 answer
  • Coral Given three floating-point numbers x, y, and z, output x to the power of y, x to the power of (y to the power of z), the a
    6·1 answer
  • Write a program named as reverse.c that reads a message, then prints the reversal of the message. The output of the program shou
    7·1 answer
  • What are the minimum number of bits an address bus must have in a byte addressable memory system containing only 4 KiB of memory
    8·1 answer
  • Which actions represent parody?
    5·1 answer
  • Why should we apply print preview before printing the document.​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!