Answer:
SSH, HTTPS and SMTP
Explanation:
Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.
Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.
Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.
Hence, SSH, HTTPS and SMTP are considered as secure network protocols.
HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL).
SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.
have self-control and if you have a problem dont be afraid to speak your mind, show other people you mean buisness, but be polite to aviod starting more problems
No personal web..............
Answer:
The correct answer to the following question will be Vendor Lock-In.
Explanation:
Vendor Lock-In: It is also known as Customer Lock-In. The Vendor Lock-In makes the costumer depends on services and products on the vendor. The costumers are not able to use another vendor without changing costs as it creates barriers.
Some ways to avoid Vendor Lock-In, these are as follows:
- Design your application portable.
- Keep watching vendor contracts.
- Arrange both entry and exit with your vendor.
Answer:
in javascript:
function compute(a, b, c){
let array = [a, b, c];
array.forEach((e,k) => {
if(e >= a && e >= b && e >= c){
console.log("maximum: " + e);
}
if( e <= a && e <= b && e <= c){
console.log("minimum: " + e);
}
}
}
Explanation: