1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verdich [7]
4 years ago
9

What is the recommended secure protocol for voice and video applications? secure real-time transport protocol (srtp) hypertext t

ransport protocol secure (https) network time protocol (ntp) secure/multipurpose internet mail extensions (s/mime)?
Computers and Technology
1 answer:
snow_tiger [21]4 years ago
8 0
The recommended secure protocol for voice and video applications is the Secure<span> Real-time Transport </span>Protocol<span> (SRTP) protocol. SRTP is a Real-time Transport </span>Protocol (RTP) profile used to  to provide encryption, message authentication and integrity.
The default cipher of SRTP is the Advanced Encryption Standard<span> (AES) .</span>
You might be interested in
Respond to the following in three to five sentences. Select the workplace skill, habit, or attitude described in this chapter (a
Katyanochek1 [597]

Answer:

communication and proactive

Explanation:

Communication is the most important thing and not only for a successful employee, is for successful life, in a company, there are a lot of people working in different areas, and sometimes we must interact with other departments to complete the task, a good communication help us to create a good experience and relationship with our partners, we're going to get efficient results.

If we want to ask more resources to our boss, we must show the needs and the benefits that company going to get, with a good presentation, inform and communication this can be easy to do, or if we are the boss, and we want to give trust our employees, we must have a good communication skills.

If we are proactive, we are going to result in almost every problem, in some companies the training is bad, we must learn process and attitudes for our job, some people are stingy with the knowledge, and we must find solution for our self, in this way we're going to be more independent, and our value increase in the company and even in the working market.

7 0
3 years ago
Write the output of the following program:
Iteru [2.4K]

Answer:

Expression A

Explanation:

In this Pseudocode, the output would be 100. This is because the code is looping from 1 to 20 and adding together all of the odd numbers between 1 and 20. Since it is checking to make sure that the remainder of each number is not equal to 0 which would indicate an odd number, and if it is odd then it adds it to the variable S. Therefore, the odd numbers between 1 and 20 are the following...

1 + 3 + 5 + 7 + 9 + 11 + 13 + 15 + 17 + 19 = 100

6 0
3 years ago
What is the primary reason that companies use third party tracking cookies?
morpeh [17]

Answer:

The most common use of third-party cookies is to track users who click on advertisements and associate them with the referring domain.

Explanation:

For example, when you click on an ad on a website, a third-party cookie is used to associate your traffic with the site where the ad appeared.

5 0
3 years ago
Write an algorithm whether the given number is positive negative or zero​
Ahat [919]

Answer:

See the code below in python.

Explanation:

num = int(input("Enter a number: "))

if (num == 0):

 print("You entered 0...")

elif (num < 0):

 print("Your entered a negative number...")

else:

 print("You entered a positive number...")

Regards: Your Friendly Study Co-Pilot!

6 0
3 years ago
Marketing có phải là bán hàng hay không? Giải thích?
barxatty [35]

Answer:

Sự khác biệt giữa bán hàng và tiếp thị là bán hàng tập trung vào làm việc trực tiếp với khách hàng tiềm năng để khiến họ chuyển đổi, trong khi tiếp thị tập trung vào việc khơi dậy sự quan tâm đến sản phẩm của bạn.

7 0
3 years ago
Read 2 more answers
Other questions:
  • What would be the desired output of a home security system?
    6·1 answer
  • When jump starting a vehicle , once the stalled vehicle is successfully started remove the cable in same order in which they wer
    13·1 answer
  • Build a state diagram for the “book” based upon the following information of the library.
    6·1 answer
  • What is the value of alpha[3] after the following code executes?
    6·1 answer
  • Anyone know the answer I need help
    12·1 answer
  • Write a function that receives an integer (n) argument and then computes the following based on the value of the integer: While
    13·1 answer
  • Object-Oriented Programming (Using Java Language)
    11·1 answer
  • Lyla is writing a program that uses a recursive method. Why might she want to use a recursive helper method?
    8·1 answer
  • Grade 11 essay about the year 2020​
    9·1 answer
  • The electors in each state shall have the qualifications requisite for electors of the most numerous branch of the state legisla
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!