1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ipn [44]
4 years ago
11

________ is a suite of protocols designed to connect sites securely using ip networks.

Computers and Technology
2 answers:
a_sh-v [17]4 years ago
7 0
IPSec


Hope that helps, Good luck!! (:
nlexa [21]4 years ago
4 0
Hello,



You answer to this problem is IPSec.


Hope this helps, And Have a good day
You might be interested in
Every employee of your company has a Google account. Your operational team needs to manage a large number of instances on Comput
Blizzard [7]

Answer:

Generate the fresh set of SSH keys. Offer every member of the team that private key. Customize the public key as a public SSH key for a project in the Cloud Platform project as well as require public SSH keys for each instance

Explanation:

Almost many person seems to have a google profile at their corporation. The vast amount of incidents on Compute Machine have to be handled by the operating staff. Any team member just requires operational accessibility towards the network. The safety department needs to ensure that credentials are distributed in such an administratively efficient way and have to be prepared to recognize that has accessed the specified case.

So, they are creating the latest key set for SSH. Offer every members of the team their private key. Customize its public key as just a public SSH key for such a program in the Cloud Platform project as well as require public SSH keys for each instance.

7 0
4 years ago
Which term is used for a formal, documented process that describes when and how official project documents may be modified, the
kondor19780726 [428]

Answer:

The term is Change control system

Explanation:

Change control system is a systematic approach or important part of project management process used to implement and serves vital purposes of assuring that the process of making changes is done carefully and ultimately signed off on by a responsible party. It enables essential control of IT activities in project management and coordination.

4 0
3 years ago
Read 2 more answers
Linda is training to become a certified network design expert and consultant. While researching about the process of cellular ra
mel-nik [20]

Answer:

a. The cell tower forwards the call to the wireless provider's Mobile Telephone Switching Office

Explanation:

When a cell phone user begins to make a call, it is picked up by the cell tower located in the cell in which the cell phone is located and that belongs to the user's wireless provider. The next step in this process is that the cell tower forwards the call to the wireless provider's Mobile Telephone Switching Office.

8 0
3 years ago
A function may return a pointer, but the programmer must ensure that the pointer:
elena-14-01-66 [18.8K]
Hello i am kust gere to answer the qustions nothing else
4 0
4 years ago
Some designer suggest that speech recognition should be used in tale phone menu system. This will allow users to interact with t
Sergio [31]

Answer:

My two arguments against the proposal are based on physical side effects and background noise interference.

Explanation:

To start with physical side effects, the use of speech recognition technology might make users experience physical discomfort. This is due to the fact that users who interact with the system by speaking for a long period would experience dry mouth, temporary loss of voice, vocal problems and muscle fatigue. In addition, the fact that users would always speak in an unnatural way to make the system interpret commands effectively could lead to voice strain.  

Also, users need to be in a quiet environment before they can get the best out of speech recognition technology. This is because background noise can interfere with commands and create a mix-up which the system cannot interpret. In other words, when an environment is noisy, speech recognition technology would find it difficult to differentiate between users voice and background noise.

4 0
3 years ago
Other questions:
  • Henry is creating a firewall rule that will allow inbound mail to the organization. what tcp port must he allow through the fire
    10·2 answers
  • Consolidating a system's physical and time resources is known as ________________.
    13·1 answer
  • What is contrast (in Photography)?
    14·1 answer
  • In this line of code, what does 144 refer to?
    12·1 answer
  • --------------------------------------------------------------------------------------------------------------------------------
    8·1 answer
  • Do you all like IXL?
    8·1 answer
  • Please Complete in Java a. Create a class named Book that has 5 fields variables: a stock number, author, title, price, and numb
    10·1 answer
  • Write an Algorithm to print only numbers from 10 to n times using iteration structure
    8·1 answer
  • Which federal legislation requires lending companies to notify consumers of changes in rates and fees?
    12·1 answer
  • Starting a computer after it has been turned off is term as​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!