1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jeka94
3 years ago
10

Traffic that is encrypted will typically pass by an intrusion prevention system untouched.a. Trueb. False

Computers and Technology
1 answer:
Sauron [17]3 years ago
3 0

Answer:

A. True

Explanation:

Data encryption is a technique that converts clear text into unreadable text and transmitted over a network, to prevent attackers from understanding the information send to the receiver, which can only be deciphered by the receiver and the sender with special keys or software.

An intrusion prevention system is used to mitigate cyber attackers by preventing unwanted packets that could be malicious, from entering the network.

The intrusion prevention system can only see clear text data. For this reason, an encrypted text can pass through the prevention system untouched.

You might be interested in
Which of these statements are true of verifying that a program’s code is fixed? Check all of the boxes that apply.
aksik [14]

Answer:

Its C.

Explanation:

hope it helps !

mark me brainliest :))

7 0
3 years ago
Read 2 more answers
To which category of software does Microsoft Works belong
puteri [66]

Answer:

c) Integrated

Explanation:

Integrated software are packages that has the functional capacity to perform the several tasks commonly performed by more than one productivity software application, such that those functions and capabilities are integrated into a single application, thereby making it possible for users to carry out required computer tasks, at a lower cost

Examples of integrated software include Microsoft Works, which includes a Word processing, spreadsheet, and database capabilities combined into one application

5 0
3 years ago
What do we use HTTP and HTML for?
xenn [34]
HTTP is protocol while HTML is a language
4 0
3 years ago
Read 2 more answers
To Get Text to Move
Kamila [148]
Today is your lucky day.. i do JavaScript, and i love coding! Happy to help. (I make games n things on Khan academy)

// make variable for x.
var startX = 0;

// start loop
draw = function() {

// if you needed to stop the text from smudging, you can add this: background(255, 255, 255);

// choose text size
textSize(30);

// make the Color red
fill(255, 0, 0);

// draw text at startX pos for X.
text(“wheee moving text!”, startX, 200);

// make text move
startX = startX + 1;

// end the loop
};

Hope this helped! I really love JavaScript, coding, and helping others so just let me know if you need help!

If you want to contact me directly, you can find me on Khan academy:

(Link im comments)

To send me a message, just click on one of my projects and leave a comment >> just remind me who you are. Happy to help!
5 0
3 years ago
Read 2 more answers
Elsa wants to save her work at the office to be continued at home either on a pen drive or CD. Outline three reasons why she wil
Rzqust [24]

Answer:

More space

Pen drives generally have more storage capacity than CDs with CDs usually having just around 700 Megabytes for storage. Pen drives on the other hand can reach up to 2 Terabytes of data storage capacity. If the file she needs to save is high, Elsa should use the pen drive.

Scratch resistant

CDs can be scratched on the way to the house and lose some data or make it harder to extract. Pen drives do not have such problems are they are encased in an outer casing.

Portable and Accessible.

Pen drives are easy to carry which makes them portable and they are easier to use because a lot of computers do not have a CD drive but every computer has a port for a pen drive therefore making data in pen drives more accessible.

4 0
3 years ago
Other questions:
  • Using the ____ browsing mode offered by some browsers can prevent personal information from being left on a public computer.
    9·1 answer
  • The central device on a network that provides a common connection point for nodes on that network is called the
    8·1 answer
  • The mathematical order of operations is used in Excel when formulas are evaluated. This order of operations states the order to
    14·2 answers
  • Best free vpn to bypass geo tagging
    5·1 answer
  • Why is it unlawful for an employer to refuse to employ someone based solely on their gender without evidence that such a charact
    9·1 answer
  • Which of the following protocols help IP in multicast service?
    9·2 answers
  • Finish the program to compute how many gallons of paint are needed to cover the given square feet of walls. Assume 1 gallon can
    9·1 answer
  • Write a C program to find the sum of 10 non-negative numbers entered by user​
    14·1 answer
  • What is the difference between websites and web page​
    8·1 answer
  • Define a function GetVolume() that takes one integer parameter passed by reference as totalCups and two integer parameters as ga
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!