1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
il63 [147K]
4 years ago
14

Which two encryption protocols might be used to provide secure transmissions for browser and web server communications?

Computers and Technology
1 answer:
andreyandreev [35.5K]4 years ago
5 0

Answer:

SSL and TLS

Explanation:

Web browsers are software applications that are used to decode and display web pages on a website. A web server is a computer system database that hold web resources requested by clients on a network.

A secure communication is essential to present eavesdropping by attackers. The SSL and TLS are two encryption protocols that are used to secure the communication line between a client and a server.

The TTL or transport layer security and SSL or secure sockets layer are used in a wide range of browser-server communications to provide a private and encrypted channel.

You might be interested in
2. (8 points) When creating the Academic Database, there were several instances of data
Bad White [126]

Answer:

See explaination

Explanation:

An Academic Database deals with the information pertaining to the records of students of an institute. The various fields which can be associated with a student are Name, Unique Identification Number, Marks in various subjects, Grades, Courses Taken and so on. Most of the fields mentioned above have some or other form of validation that is required for the DB to be consistent and follow the basic properties of a database.

One field where range validation can be used is MARKS. In the marks field, the range of marks will be say 0 to 100 and anything below 0 or above 100 must be reported to the database administrator. Another field where we can apply a range validation is AGE in which the range of age allowed could greater than say 10, if it is a college and maximum age could be say 60. Thus, the range check on the AGE field is 10 to 60.

One field where choice validation can be used is GENDER. In the gender field, there could be multiple choices like Male, Female and Others. Thus, out of the available choices we have to select only the available choice and only one choice must be selected where we can apply choice validation. Another field is COURSE, where we can have a list of courses a student can opt for and out of the available courses can select one.

Thus, there are multiple fields where we can apply various types of validation and it is important to explore the area for which the DB has been created understanding all the scenarios and attributes of the problems that are associated with that area.

8 0
4 years ago
IF ANSWER I WILL BE REALLY HAPPY
butalik [34]

Answer:

C.

Explanation:

7 0
3 years ago
Read 2 more answers
True or False: Cracking a Vigenère cipher with brute force takes longer than a Caesar cipher, but it is still a reliable method
iragen [17]

Answer:

False

Explanation:

The Vigenere cipher is an encryption method that uses a series of interwoven Ceaser ciphers and a keyword to encrypt text. The difference between this cipher and the Ceaser cipher is the tabular interwoven Ceaser cipher and the keyword.

Multiple keywords can be used in the Vigenere cipher. The use of this keyword makes the brute-force decipher algorithm unreliable for decoding text encrypted with it.

7 0
3 years ago
The grade of a metric bolt is designated by
Andre45 [30]
The answer to your question is The grade of a metric bolt is designated by the number stamped on the head of the bolt.
5 0
3 years ago
John wants to use graphical elements on his web page. Which image formats should he use to keep the file size manageable?
asambeis [7]

Answer:

PNG, GIF

Explanation:

On a Web page, we'll assume he'll have simple graphic elements like icons, or other simple low-resolution and a lower number of colors (256-), these are usually better saved in GIF format to take less space, just because of the smaller color map, but PNG could also do a great job and  it offers transparency as well (like GIF does).

For more complex elements (larger size and/o more colors like photos), the best format to save them is probably the PNG one.  They will be compressed but still offer a great quality.

7 0
4 years ago
Other questions:
  • A website updated daily could be considered _____. a. authoritative b. objective c. accurate d. timely
    8·1 answer
  • Which command can be used to connect to a remote windows share called data on the server called fileserver?
    12·1 answer
  • A folder can contain only files? A. True B.False
    10·2 answers
  • Write a recursive method called repeat that accepts a string s and an integer n as parameters and that returns s concatenated to
    7·1 answer
  • Write two statements to read in values for my_city followed by my_state. Do not provide a prompt. Assign log_entry with current_
    13·1 answer
  • After an attacker has successfully gained remote access to a server with minimal privileges, which of the following is their nex
    15·1 answer
  • Counting calculus students. About A university offers 3 calculus classes: Math 2A, 2B and 2C. In both parts, you are given data
    6·1 answer
  • Describe how computers are used to access, retrieve, organize, process, maintain, interpret, and evaluate data and information.
    13·1 answer
  • Will creates an entry in his calendar and marks it as an all-day instance. Which item has he created?
    10·1 answer
  • question 1 scenario 1, question 1-5 you’ve just started a new job as a data analyst. you’re working for a midsized pharmacy chai
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!