1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlad1618 [11]
4 years ago
5

Mercury Technical Solutions has been using SSL in a business-to-business environment for a number of years. Despite the fact tha

t there have been no compromises in security, the new IT manager wants to use stronger security than SSL can offer. Which of the following protocols is similar to SSL but offers the ability to use additional security protocols?
A. SSH
B. TLS
C. X.509
D. RSH
Computers and Technology
1 answer:
andrezito [222]4 years ago
4 0

Answer:

B) TLS (Transport Layer Security)

Explanation:

SSL refers to secured socket layer, while TLS refers to Transport Layer Security. They are both security measures implementing crytography to ensure secured communication on a network especially in web and electronic mails. While very minor technical differences exist between these two protocols, SSL is veiwed as outdated because TLS uses stronger algorithms for encryption. The SSL is also unable to work on different ports unlike TLS.

You might be interested in
E) Point out the errors( if any) and correct them:-
leonid [27]

Explanation:

double e-d/5.6;is wrong it should return to c

5 0
3 years ago
What is meant by Angular 4?
Blizzard [7]
Hehebebehehehdhdhyuwiiwwiuhwbbwb is bfbbend
6 0
3 years ago
Read 2 more answers
Create an algorithm that will convert dog years to human years using the assumption that 1 dog year = 7 human years. Prompt the
matrenka [14]

Answer:

Algorithm:

1. Declare and initialize variable one_dog_year=7.

2.Ask user to give dog age.

   2.1 Read the dog age and assign it to variable "dog_age".

3.Create a variable "human_age" to store the equivalent human age.

   3.1 Calculate equivalent human age as "human_age=one_dog_year*dog_age".

4.Print the equivalent human age of dog age.

7. End the program.

// here is algorithm implemented in c++

#include <bits/stdc++.h>

using namespace std;

int main()

{

   // initialize one dog year

   int one_dog_year=7;

   int dog_age;

   int equi_h_age;

   cout<<"Enter the dog age:";

   // read the dog age

   cin>>dog_age;

   

   //calculate the equivalent human age

   equi_h_age=dog_age*one_dog_year;

   cout<<"equivalent human age is : "<<equi_h_age<<endl;

return 0;

}

Output:

Enter the dog age:2                                                                                                                                            

equivalent human age is : 14

4 0
3 years ago
Summarize who you believe cyber criminals are, and why?
sergij07 [2.7K]

Answer:

 The cyber criminals are the people that are engaged with getting the data in an unapproved way and furthermore mischief to the association henceforth are considered as cyber criminals.

Cyber criminals are people or groups of individuals who use innovation to committed the malicious exercises on computerized frameworks or systems with the aim of taking the organization data or individual information and producing benefit.

There are many types of cyber criminals that are:

  • Internet stalkers
  • Cyber terrorist
  • Identity thieves

5 0
4 years ago
Mad libs are activities that have a person provide various words, which are then used to complete a short story in unexpected(an
Vsevolod [243]

did you just put random a*s word together and expect us to know the ¨answer¨

5 0
3 years ago
Other questions:
  • Which resource helps a user access a cloud service?
    13·2 answers
  • While traveling in India, Sabina notes all of her daily expenses in rupees in her spreadsheet. At the end of the day, she wants
    5·2 answers
  • Ano kaya ang nararamdaman mo at mangyari sayo kung tatlong araw ka nang hindi kumakain​
    6·1 answer
  • The Internet raises the bargaining power of customers most effectively by: making information available to everyone. reducing ba
    15·1 answer
  • Write an algorithm that receives a number from the user (you can store the number in a variable called N). Then the algorithm sh
    8·1 answer
  • What does the noise reduction tool do?
    11·1 answer
  • Create the following new exceptions: PokemonException, which extends the Exception class. It must have a no-parameter constructo
    13·1 answer
  • Nancy finds it difficult to locate emails in her Inbox. What action should she take to locate a particular type of email instant
    10·1 answer
  • Which of the following is not a benefit provided by a stakeholder analysis document
    7·1 answer
  • How to fix this? Zoom it in to see it better
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!