1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dangina [55]
3 years ago
14

________ is an encryption standard used for secure transactions such as credit card processing and online banking. TLS DMZ White

listing VPN
Computers and Technology
1 answer:
Fynjy0 [20]3 years ago
8 0

Answer:

TLS

Explanation:

In the field of computer security, TLS refers to Transport Layer Security it is closely related to the Secure Sockets Layer (SSL) although TLS is more commonly used these days. They are both techniques in cryptography that provides for the safe transfer of information between two parties (servers, systems and user applications)

TLS particularly provides a balance between transmission speed and data security through the use of symetric and asymmetric cryptography and the encryption and decryption key is the session key at both ends (sender and reciever), as such TLS has found usage in most advanced data exchange systems like credit card processing and online banking.

You might be interested in
Hurry plz
Elanso [62]

Answer: It allows you to locate materials, be aware of your assignments and plan time to get things done.

Hope it helped.

3 0
3 years ago
A negative effect of computer technology's role in creating images is that:
otez555 [7]

Answer:

Personally would go with D.

Information being shared could be both good and bad but it all would be about the situation and if it was private information or not.

5 0
3 years ago
Read 2 more answers
Which statement about synchronous communication is true?
tangare [24]
In general, synchronous communication means you have to wait for the answer all the time. The programming logic is simpler, but the cost that you spend a lot of time waiting.

If the options are:

<span>a. The people communicating don't need to be online at the same time.
b. There is lag time in the communication.
c. The communication occurs in real time.

a is false, you do need to be online to receive the message
b is true, typically you continue only after an acknowledgement
c is true, you wait for acknowledgement that occurs in real time (not necessarily fast though)</span>
3 0
3 years ago
Sara is writing a program to input her monthly phone bills and output the month name and amount for the month with maximum amoun
Andru [333]

Answer:

# include <conio.h>

#include <iostream.h>

using namespace std;

main()

{

int billamount[12];

char monthname["January", "February", "March", "April", "May", "June", "July", "August", "September", "October", "November", "December"];

<em>for (int month = 1 ; month<=12; month++)</em>

<em>{</em>

<em>cout<<"Enter the amount of bill for the month"<<month;</em>

<em>cin>>billamount[month];</em>

<em>}</em>

for (i=0; i<= 12; i++)

{

if (billamount[0]<billamount[i])

billamount[0]=billamount[i];

monthname[0]=monthname[i];

}

<em>cout<<"Maximum months phone bill"<<monthname[0]<<"="<<billamount[0]</em>

<em />

getch();

}

6 0
3 years ago
When companies want people to think their brand is wholesome, trustworthy, and confident, this is the color most often chosen.
notsponge [240]
A. Blue. When you want to be viewed as trustworthy and cool you would use the color blue.
6 0
3 years ago
Read 2 more answers
Other questions:
  • Brian is testing a banking application. He enters an input and expects a certain output. What is the actual output of the applic
    11·1 answer
  • What is the output of this code? import java.util.HashSet; class A { public static void main(String[ ] args) { HashSet set = new
    15·1 answer
  • 1 Explain the difference between using a computer program and programming a computer.
    12·1 answer
  • After correctly configuring a new wireless enabled thermostat to control the temperature of the company's meeting room, Joe, a n
    6·1 answer
  • Who can help me with 50 varables on codeskulptor​
    8·1 answer
  • software that provides capabilities common across all organizations and industries is known as ________ software.
    15·2 answers
  • In ____________________ testing, security personnel simulate or perform specific and controlled attacks to compromise or disrupt
    10·1 answer
  • Determine what is printed by the following code.
    8·1 answer
  • When do you use a for loop instead of a while loop? (There may be more than one answer.)
    9·1 answer
  • What is a computer class from 8​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!