1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sertanlavr [38]
3 years ago
9

To determine whether you’re transmitting data over a secure connection, you can _____ check the appSettings section of the web.c

onfig file refer to the URL in the browser’s address bar check for a lock icon in the browser’s title bar watch for the security alert that’s displayed whenever you’re about to establish a secure connection
Computers and Technology
1 answer:
kati45 [8]3 years ago
3 0

Answer:  refer to the URL in the browser’s address bar

Explanation:

Basically for the communication to flourish we have to transmit data across various clients and destinations. So the first step in this regard is connecting to the nameserver of the destination. for this we have to type the name of the desired IP from the URL in our browser.

As for example we can type http://www.google.com

Hereby the client is connecting to the google server by simply typing its address in the URL.

Here http:// is not a secure connection so most often we use https:// for a better security so that we can transmit the packet in a safe manner to the desired host.

So in order to identify whether we have use  secured protocol for the application server we have to refer to the URL in the browser’s address bar.

You might be interested in
Lara sees her colleague taking a bribe from a customer. What should she do?
kondaur [170]
She should report it to the superviser
6 0
3 years ago
Read 2 more answers
How does polling-based network receive work? How is it different than interrupt based network? Describe both functions and list
Alenkasestr [34]

In a polling-based network receives, the operating system keeps checking the status register after a fixed time interval to see whether a device needs hardware attention or not. CPU gradually checks the status of receive bit after a defined time interval of a clock and if the value of receive bit is true then data is moved from the RX register to the memory. In interrupt-based networks, whenever a device needs hardware processing then an interrupt is raised to inform the CPU for device attention. The data of the device is transferred to memory from the network card.

Polling is a protocol, not a hardware mechanism where the device gets attention by CPU. An interrupt is a hardware mechanism, not a protocol where the device gets attention by the interrupt handler. In polling, during receiving, parts of received data need to transfer to memory but in case of interrupts, whole data is transferred at once after receiving is done. An interrupt is a heavy operation as compared to pooling because hardware involves in it. For large amounts of data, Polling becomes an inefficient method. In polling, CPU gradually checks devices at regular intervals whereas the Interrupt handler can send interrupt at any time. Each device has its own Command ready bit which indicates whether the device requires servicing or not. In polling, CPU wastes numerous clock cycles by repetitively checking the command-ready little bit of each device. In Interrupt based network, the interrupt request line indicates whether the device requires servicing or not. In interrupt-based network, CPU cycles not wasted but CPU is disturbed only when device send interrupt signals.  

Relative performance between programmed I/O and DMA:

For determining the relative performance between programmed I/O and DMA, important factors are:

1. Size of data  

2. Frequency of operations

5 0
4 years ago
Give an example of SaaS (Software as a service) and explain why this can impact organisational security posture
lara31 [8.8K]

In the case above, An  example of SaaS (Software as a service) are DropBox, UserGuiding and Salesforce.

<h3>How does SaaS (Software as a service) impact organizational security posture?</h3>

Software-as-a-Service (SaaS) security posture management (SSPM) is known to  be a kind of a group that is made up of an automated security tools that is used for tracking security threats in regards to SaaS applications.

<h3>What is organization level security in Salesforce?</h3>

The organizational level is known to be one that gives room for a person to decide if and from where a given users can be able to access the system.

Note that SaaS platforms is made up of software that is said to be available via third-party and they include BigCommerce, Salesforce and others.

Learn more about SaaS from

brainly.com/question/24852211

#SPJ1

4 0
2 years ago
What would happen if the bitmap or free list containing the information about free disk blocks was completely lost due to a cras
masha68 [24]

Answer:

It can be repaired with disk utility / recovery algorithms

In UNIX it can be done by scanning

In FAT file scan the FAT looking for free entries

Explanation:

When the crash happens, it is not a problem for UNIX and FAT file system

It can be repaired with disk utility/recovery algorithms.

The recovery algorithm is a list of all blocks in all files and takes a compliment as new free file.

In UNIX scanning can be done at all I-nodes.

In FAT file problem cannot occur because there is no free list .If there was any problem than it would have to be done to recover it to scan the FAT looking for free entries.

7 0
4 years ago
84.6% complete question a network administrator is installing a device that uses redundant array of independent disks (raid) tec
Alja [10]

The device that this network administrator is most likely installing in the infrastructure is a Network Attached Storage (NAS).

<h3>What is a Network Attached Storage (NAS)?</h3>

A Network Attached Storage (NAS) can be defined as a file-dedicated storage device that is designed and developed to enable multiple end users and other heterogeneous client devices to store, share and retrieve data anywhere from a centralized disk, especially through a network.

In this context, we can infer and logically conclude that a Network Attached Storage (NAS) is the device that this network administrator is most likely installing in the infrastructure because it doesn't require licensing and the data stored on it at the file level can be accessed anywhere.

Read more on Network Attached Storage here: brainly.com/question/14456295

#SPJ1

3 0
2 years ago
Other questions:
  • Which of the following statements is false? A constructor is similar to a method but is called implicitly by the new operator to
    6·1 answer
  • A Java main method uses the parameter (String[ ] variable) so that a user can run the program and supply "command-line" paramete
    5·1 answer
  • When installing a device driver, start the computer in
    6·1 answer
  • You cannot legally install macOS on a PC that originally came with Windows<br> True or false
    13·2 answers
  • What is the unofficial name given to the culture that has emerged from living in the age of digital media, whereby people are fr
    7·2 answers
  • Hi, please help me.solution.​
    7·1 answer
  • Recall the binary search algorithm.1. Using the algorithm/algorithmic environment, give pseudocode using a for loop.AnswerMy alg
    5·1 answer
  • Discuss the technologies that implements an infrastructure for component communication
    7·1 answer
  • What are the common internal components to most electronic devices?
    10·1 answer
  • What is utility Software​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!