Some protocols have multiple algorithms to choose from for e.g., cryptographic purposes. During connection set up, client and server negotiate which one they'll use.
One example is the set up of a TLS connection. During the handshake, the client shares a list of its supported ciphers (the 'ciphersuites'). The server responds by indicating the best one that both sides support.
 
        
        
        
Answer:
c. execution falls through the next branch until a break statement is reached
Explanation:
In a switch statement, if break is missing, then program continues to the next cases until it finds a break statement. 
Consider the following example!
Example:
#include <iostream>
using namespace std;
int main() 
{ 
   int choice = 1; 
   switch (choice)
   { 
       case 1:
       printf("This is case 1, No break\n"); 
       case 2:
       printf("This is case 2, No break\n"); 
       case 3:
       printf("This is case 3, with break\n"); 
       break;
       default: printf("Error! wrong choice\n"); 
   } 
   return 0; 
}
Output:
This is case 1, No break
This is case 2, No break
This is case 3, with break
We have 3 cases here and case 1 and 2 don't have break statements, only case 3 has a break statement.
We called the case 1, then program continued to case 2,  and finally to case 3 where it finds the break statement and terminates. 
Therefore, we conclude that in a switch statement, if a break statement is missing, then execution falls through the next branch until a break statement is found.
 
        
             
        
        
        
Answer:
b. Machine learning
Explanation:
The technique that is being described in this situation is known as Machine Learning. This is a fairly new technology that has become popular over the last decade. Machine learning uses artificial intelligence to analyze data and learn from it. Every time the system analyzes the data it learns something new, saves it, and implements it to its processes. Therefore, the more times it repeats the more it learns. These systems are continuously getting better and learning more, which makes them incredibly efficient.
 
        
             
        
        
        
Inside the case are the components that make up the computer itself, such as the RAM memories, the processor and the hard disk, all of which are directly or indirectly connected to the motherboard. In addition, the case allocates the power suplly, which is responsible for supplying power to the computer.
<h3>What is a computer case?</h3>
The case is the hardware component used to house most parts of a computer. It is inside it that components such as CPU, motherboard, SSD, video card and power supply are placed.
In addition, it is where the outputs for connections to other equipment are found, such as USB and HDMI outputs, plug for sound box and microphone and input for memory card.
The case has the important function of protecting the internal components of a computer from knocks, heat, light, moisture and dust. That's because most of the electronic components inside a computer are very sensitive and need this protection.
It is also used to connect to other hardware components, such as a monitor, keyboard, mouse and headset, through the various outputs provided on its exterior.
See more about computing at: brainly.com/question/15707178
#SPJ1
 
        
             
        
        
        
Answer:
Event procedure
Explanation:
Whenever a user perform certain action, such as press a button on the keyboard or click the mouse, etc. such action are called an event. when an event occurs, Visual Basic looks for BASIC instructions to tell the object in the program how to behave to the user event. The Visual Basic instructions that responds to this specific event is called an event procedure.