1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Harman [31]
3 years ago
5

To secure the company website, the webmaster suggests that the company purchase a secure certificate to encrypt all communicatio

ns to and from the site.
A certificate is which type of secure token?
Computers and Technology
1 answer:
iVinArrow [24]3 years ago
4 0

Answer: Software

Explanation:

Security certificate is defined as the assurance that maintain authenticity and intactness of a website or different sites.It is present in small sized data filed that establishes encryption and validation through verification of owner's identity.

  • As per the suggestion of Webmaster, who takes care of web-pages and web-servers , security certificate should be purchased to verify the transmission of message with encryption.
  • Certificate in this case will be acting as software for providing security and operations to the websites.

You might be interested in
Why do you think that so many of these sources have similar names?
Anon25 [30]

Answer:

What sources? WILL ANSWER in comments

4 0
3 years ago
Does a newer game work on older computer
babunello [35]
I don't think so because the old computers may have not been to date as what we have now but check it out and see.
5 0
3 years ago
What is a distinguishing feature of 5G mm Wave?
RoseWind [281]

Answer: 5G high bands (mmWave, also referred to as FR2) are found in the range of 24GHz to 40GHz. They deliver large quantities of spectrum and capacity over the shortest distances

4 0
3 years ago
In your own words, describe the advantages and disadvantages of the auto-negotiation protocol used in Ethernet communications.
dexar [7]

Answer:

 Auto-negotiation protocol is the modern technology in the networking. This protocol allow the ethernet equipment for automate different instillation steps. This type of protocol use by interconnecting various electronic devices for negotiating the speed of the link.  

Advantages:

  •  The auto negotiation protocol features used to maximize the throughput of data link layer.
  •  This protocol are basically useful in the local area network (LAN), with multiple capability of connections.
  •  The auto negotiation protocol extremely useful in twisted pair which are based on ethernet.

Disadvantages:

  •   This type of protocol are not fixed data links and not used as backbone of the networks.  
  •  Duplex mismatch occur then, it cause significant loss in the packets.

7 0
3 years ago
Write a raptor program that will display the count from 100 to 0 in decrements of 5.
S_A_V [24]

A raptor program that will display the count from 100 to 0 in decrements of 5 is shown below.

<h3>What is a raptor program?</h3>

This refers to a programming environment that works on a flowchart basis to help the user to present their algorithms in a visual manner.

Using a raptor program, you can display a count from 100 to 0 in decrements of 5 as shown:


#include <iostream>

#include <string>

using namespace std;

int main()

{

int count;

Count =100;

while (Count<=0)

{

cout << Count << endl;

Count =Count-5;

}

return 0;

}

The result would be a list showing numbers that go from 100 to 0 in decrements of 5.

Find out more on raptor programs at brainly.com/question/15082977

#SPJ1

3 0
1 year ago
Other questions:
  • A(n) ____________________ is a set of programs that coordinates all the activities among computer or mobile device hardware.
    10·1 answer
  • Is there a way to find the answers to I ready on the internet?
    6·1 answer
  • Stealing passwords by using software code to run through various password schemes with numbers, symbols, capital letters, and ch
    6·1 answer
  • Which part of a computer takes the text and pictures on your screen and prints them onto paper?
    6·1 answer
  • Discuss some design considerations that you should keep in mind when you want to design a professional-looking flyer or newslett
    12·1 answer
  • The Spanning Tree Protocol operates at the Network layer of the OSI model.
    13·1 answer
  • Among your selection in different online interfaces, which are your top three favorites?​
    7·2 answers
  • Please help.........​
    13·1 answer
  • The ___________ method returns the length of an array.
    11·2 answers
  • Which of the following is typiacally the last step of the mail merge process
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!