1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verdich [7]
3 years ago
9

What is the recommended secure protocol for voice and video applications? secure real-time transport protocol (srtp) hypertext t

ransport protocol secure (https) network time protocol (ntp) secure/multipurpose internet mail extensions (s/mime)?
Computers and Technology
1 answer:
snow_tiger [21]3 years ago
8 0
The recommended secure protocol for voice and video applications is the Secure<span> Real-time Transport </span>Protocol<span> (SRTP) protocol. SRTP is a Real-time Transport </span>Protocol (RTP) profile used to  to provide encryption, message authentication and integrity.
The default cipher of SRTP is the Advanced Encryption Standard<span> (AES) .</span>
You might be interested in
________ is the extent to which differences in observed scale scores reflect true differences among objects on the characteristi
AysviL [449]

Answer: Validity

Explanation:Validity is the type of claim that is made towards the measuring of reliability of any element. The differences appearing in the measurement of the elements displays the validly factor is not up to the mark which indirectly implies that reliability is not high. Validity is the situation in which all the parameters appearing in the element is perfect. If validity is perfect then only perfect reliability is achieved.

7 0
3 years ago
Discuss positive and negative impacts of computers to our economy
NeX [460]
Positive: they have enable individuals,small groups,visibility and opportunities as big businesses

Negative: poor eye sight, obesity & weight loss and premature aging
4 0
2 years ago
Which statement is true about digital footprints?
RUDIKE [14]

Answer:

all of the above.

Explanation:

Your digital footprint is a sum total of the digital activity carried out by you while online. This generates a lot of data about you and is potentially permanent. Once generated it is very difficult to alter it and you are not in control of the data that has been generated. The digital footprint can be used to profile your behavior and has privacy related implications. So it is very important to be conscious of your digital footprint while working online.

5 0
3 years ago
1. How does inertia affect a person who is not wearing a seatbelt during a collision?
Ivenika [448]
They could go flying out the window, getting seriously injured. This could also leave to death.
5 0
2 years ago
Read 2 more answers
Write the text of the program in Python.
vodka [1.7K]

Answer:

wow its quite long ill send it to you in a couple of days

8 0
2 years ago
Other questions:
  • Given positive integer num_insects, write a while loop that prints that number doubled up to, but without exceeding 100. Follow
    8·1 answer
  • When users create, alter, or drop tables or create or drop indexes, the dbms updates the system catalog automatically.​?
    6·1 answer
  • You are given a class named Clock that has one int instance variable called hours.
    14·1 answer
  • Write a generic C++ function that takes an array of genericelements and a scalar of the same type as the array elements. Thetype
    13·1 answer
  • Guys for those who are familiar to bubble gum sim...THERE IS A HUGE EVENT AND I DONT WANT TO FAIL AN EVENT...(again) is anyone w
    9·1 answer
  • What was your learning target for today
    9·2 answers
  • As a general rule, the number of bullet points on a slide should not exceed _____. a.2 b.4 c.8 d.10
    9·1 answer
  • Please solve in 5 mins very fast​
    11·2 answers
  • The main part of your program has the following line of code.
    7·1 answer
  • How do we store value in a variable? Give an example
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!