1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GenaCL600 [577]
3 years ago
13

What port is typically reserved and utilized by the Secure Hypertext Transfer Protocol to create a secure connection to a Web se

rver?
Computers and Technology
1 answer:
jek_recluse [69]3 years ago
4 0

Answer:

Port 443

Explanation:

This is the Hypertext Transfer Protocol Secure that combines the HTTP with a cryptographic protocol, which can be used for payment transactions and other secure transmission of data from Web pages. Whenever you connect to a website beginning with "https://" or you see the lock icon, you’re connecting to that web server over port 443.

You might be interested in
Arnie is planning an action shot and wants the camera to move smoothly alongside his running characters. He is working on a tigh
cricket20 [7]
Camera and wagon are answer
4 0
2 years ago
What important advice to include about spyware, viruses and other types of malware
S_A_V [24]

Answer:

You should probably include the fact that most of these things will disguise themselves as fake downloads and that will most of the time claim to allow you to download something that costs money for free.

Explanation:

thats all i could come up with

5 0
2 years ago
Read 2 more answers
Given a floating-point formal with a k-bit exponent and an n-bit (fraction, write formulas for the exponent E, significant M, th
ANEK [815]

Answer:

A) Describe the number 7.0 bit

The exponential value ( E ) = 2

while the significand value ( M ) = 1.112  ≈ 7/4

fractional value ( F )  = 0.112

And, numeric value of the quantity ( V )  = 7

The exponent bits will be represented  as :  100----01.

while The fraction bits will be represented  as : 1100---0.

<u>B) The largest odd integer that can be represented exactly </u>

The integer will have its exponential value ( E ) = n

hence the significand value ( M )

=  1.11------12 = 2 - 2-n

also the fractional value ( F ) =  

0.11------12 = 1 – 2-n

Also, Value, V = 2n+1 – 1

The exponent bits  will be represented  as follows:  n + 2k-1 – 1.

while The bit representation for the fraction will be as follows: 11---11.

<u>C) The reciprocal of the smallest positive normalized value </u>

The numerical value of the equity ( V ) = 22k-1-2

The exponential value ( E )  = 2k-1 – 2

While the significand value ( M )  = 1

also the fractional value ( F ) = 0

Hence The bit representation of the exponent will be represented as : 11---------101.

while The bit representation of the fraction will be represented as : 00-----00.

Explanation:

E = integer value of exponent

M = significand value

F = fractional value

V = numeric value of quantity

A) Describe the number 7.0 bit

The exponential value ( E ) = 2

while the significand value ( M ) = 1.112  ≈ 7/4

fractional value ( F )  = 0.112

And, numeric value of the quantity ( V )  = 7

The exponent bits will be represented  as :  100----01.

while The fraction bits will be represented  as : 1100---0.

<u>B) The largest odd integer that can be represented exactly </u>

The integer will have its exponential value ( E ) = n

hence the significand value ( M )

=  1.11------12 = 2 - 2-n

also the fractional value ( F ) =  

0.11------12 = 1 – 2-n

Also, Value, V = 2n+1 – 1

The exponent bits  will be represented  as follows:  n + 2k-1 – 1.

while The bit representation for the fraction will be as follows: 11---11.

<u>C) The reciprocal of the smallest positive normalized value </u>

The numerical value of the equity ( V ) = 22k-1-2

The exponential value ( E )  = 2k-1 – 2

While the significand value ( M )  = 1

also the fractional value ( F ) = 0

Hence The bit representation of the exponent will be represented as : 11---------101.

while The bit representation of the fraction will be represented as : 00-----00.

8 0
3 years ago
Using the Internet as interpersonal communication. Find a way to
Tomtit [17]

Answer:

Idk if an app is ok too but for an app there is one called monkey. my friend showed it me. you can meet a loy of new people on there. its a speed video call with everyone. I think you get 30 seconds and if you want to talk more then you just add time or add each other as friends

4 0
3 years ago
Perfective maintenance usually is cost effective ____ the system
Svetlanka [38]

Answer:

During the middle of

Explanation:

Perfective maintenance usually is cost effective during the middle of the system.

6 0
3 years ago
Read 2 more answers
Other questions:
  • 5. RAM IS YOUR SYSTEM’S-
    14·2 answers
  • Your ipad has an application that will not stop running. what feature/tool can you use to stop it? kill treason task manager for
    6·2 answers
  • A computer supply company is located in a building with three wireless networks.
    10·1 answer
  • Tree diagrams are useful for
    12·1 answer
  • The purpose of a function that returns "void" is:_________. A) To satisfy compiler warnings B) To package a repeated task as a f
    7·1 answer
  • Which symbol is at the beginning and end of a multiline comment block? &amp;&amp;&amp; """ %%% ###
    5·1 answer
  • A data center needs to ensure that data is not lost at the system level in the event of a blackout. Servers must stay operable f
    6·1 answer
  • How to enter date in a Date/Time field?​
    8·1 answer
  • Which layer of the OSI model provides a user interface in the form of an entry point for programs to access the network infrastr
    10·1 answer
  • Which of the following recommendations should you follow when placing access points to provide wireless access for users within
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!