1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dangina [55]
3 years ago
14

________ is an encryption standard used for secure transactions such as credit card processing and online banking. TLS DMZ White

listing VPN
Computers and Technology
1 answer:
Fynjy0 [20]3 years ago
8 0

Answer:

TLS

Explanation:

In the field of computer security, TLS refers to Transport Layer Security it is closely related to the Secure Sockets Layer (SSL) although TLS is more commonly used these days. They are both techniques in cryptography that provides for the safe transfer of information between two parties (servers, systems and user applications)

TLS particularly provides a balance between transmission speed and data security through the use of symetric and asymmetric cryptography and the encryption and decryption key is the session key at both ends (sender and reciever), as such TLS has found usage in most advanced data exchange systems like credit card processing and online banking.

You might be interested in
What is encyclopedia. Com considered to be?
nydimaria [60]
An encyclopedia is reference material and a tertiary source. A tertiary source is a distillation and collection of primary and secondary sources.  A tertiary source is good place to get an overview of a subject. <span>Encyclopedias are also considered a scholarly source. The content is written by an academic for an academic audience.</span>
7 0
3 years ago
:If a process terminates, will its threads also terminate or will they continue to run? Explain your answer.
Molodets [167]

Answer:

Threads will terminate

Explanation:

Each process are assigned there own memory and resources, Process is also called Application such as Chrome, Word etc. Process can have one or many threads. each thread shares the memory and resources of its process.

Once the process terminates and its free its memory and resources, Which means all of its threads automatically terminated as they share the memory and resources of process.

Thread can only resides within process resources.

5 0
3 years ago
1. List three tabs that make up the Ribbon
Roman55 [17]

Answer:

To create actions panes

On the Project menu, choose Add New Item.

In the Add New Item dialog box, select ActionsPaneControl, and then choose Add.

The ActionsPaneControl1.cs or ActionsPaneControl1.vb file opens in the designer.

From the Common Controls tab of the Toolbox, add a label to the designer surface.

In the Properties window, set the Text property of label1 to Actions Pane 1.

Repeat steps 1 through 5 to create a second actions pane and label. Set the Text property of the second label to Actions Pane 2.

Explanation:

hope it helps

3 0
3 years ago
State why hexadecimal is used to display the error code
maxonik [38]
“Hexadecimal uses digits that more closely resemble our usual base-10 counting system and it's therefore easier to decide at a glance how big a number like e7 is as opposed to 11100111. Higher information density. With 2 hexadecimal digits, we can express any number from 0 to 255.”
7 0
3 years ago
What is computer?explain any five characteristic in short.​
miv72 [106K]

Answer:

computer is an electronic machine which work on the basic principle" ipo"(input process and output.

it's characteristics are

Accuracy

Computers perform calculations with 100% accuracy. Errors may occur due to data inconsistency or inaccuracy.

Diligence

A computer can perform millions of tasks or calculations with the same consistency and accuracy. It doesn’t feel any fatigue or lack of concentration. Its memory also makes it superior to that of human beings.

Versatility

Versatility refers to the capability of a computer to perform different kinds of works with same accuracy and efficiency.

Reliability

A computer is reliable as it gives consistent result for similar set of data i.e., if we give same set of input any number of times, we will get the same result.

4 0
3 years ago
Read 2 more answers
Other questions:
  • Regarding an intrusion detection system (IDS), stateful matching looks for specific sequences appearing across several packets i
    9·1 answer
  • Devices such as monitors and printers that are connected to a computer are called ________.
    12·1 answer
  • Which of them does not support decision making? Options DSS, GDSS, ESS All of above
    10·1 answer
  • What type of attack intercepts communication between parties to steal or manipulate the data?
    13·1 answer
  • If you're unsure if something
    9·2 answers
  • Which of the following is not true about VOIP?
    9·1 answer
  • In the 1880’s advancements in technology and processes made photography available to the general public. Who is considered the m
    12·1 answer
  • What are the differences, physically and logically, between the two printing configurations: Network-attached Printing and Netwo
    7·1 answer
  • Different between input and output device​
    5·1 answer
  • An opening inside the system unit in which you can install additional equipment can be known as
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!