1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zavuch27 [327]
3 years ago
14

The Secure Sockets Layer which relies on __________ for encrypting the data between client and server

Computers and Technology
1 answer:
Natasha2012 [34]3 years ago
6 0

Answer: symmetric encryption

Explanation:

The Secure Sockets Layer (SSL) protocol is required by the Web servers and the web browsers in order to protect the data of the users during transfer through the creation of an encrypted channel that is unique for private communications that occur over the Internet.

The Secure Sockets Layer relies on the encryption in order to secure the link that exists between the client and the server which is the website.

This implies that the encryption and also the decryption of the data will be done using a cryptographic key that is shared. The cryptographic key will be generated and shared on accordance with transport layer security handshake.

You might be interested in
The systems development life cycle (SDLC) is the overall process of developing, implementing, and retiring information systems t
MissTica

Answer:

the system development life cycle (SDLC) is the overall process of developing, implementing, and retiring information systems through a multistep process—initiation, analysis, design, implementation, and <u>maintenance to disposal.</u>

Explanation:

There are several  SDLC models and each generally consists of a numbers of definite stages. For a given adopted SDLC model, information security and product services must be integrated in to the SDLC to ensure appropriate protection for the information that the system will transmit, process, and store.

8 0
3 years ago
Explain the difference between overexposed vs. underexposed images?
hichkok12 [17]

Answer:

If a photo is too dark, it is underexposed. Details will be lost in the shadows and the darkest areas of the image. If a photo is too light, it is overexposed. Details will be lost in the highlights and the brightest parts of the image.

3 0
3 years ago
Read 2 more answers
All of the following are true about data science and big data except: a.Digital data is growing at the rate of 2.5 quintillion b
Firlakuza [10]

Answer:

Option C

Explanation:

All of the following are true about data science and big data except No digital data is stored in traditional databases

Reason -

Data generated in current time is of large size and is also complicated. Traditional data bases such as SQL databases etc. are not capable to store  data that is changing at a fast pace and has huge volume, veracity, variety and velocity. But big data platforms such as Hadoop can store big data and process it speedily and easily.

3 0
3 years ago
In Python, the data structure that stores elements of the same data type is called an array.
Serhud [2]

Answer:

Yes

Explanation:

An array is a homogeneous data structure (elements have same data type) that stores a sequence of consecutively numbered objects--allocated in contiguous memory. Each object of the array can be accessed by using its number (i.e., index). When you declare an array, you set its size.

3 0
3 years ago
Which of the following is not one of the four methods for classifying the various instances of malware by using the primary trai
BlackZzzverrR [31]

Answer: Source

Explanation: The malware is the software persisting malicious approach to cause the damage/loss.The primary trait of the malware are infection,concealment,etc.

The concealment refer to the malware such as the Trojan horse, and other viruses that has only purpose to cause the malfunctioning in the system.The virus that get into the other software and then damage the system in known as the infectious malware .

The circulation is the transferring of the virus in the circular manner between the system for the damaging.Thus,the only trait that is not the part of the malware is source.

4 0
3 years ago
Other questions:
  • WHAT SHOULD YOU DO IF AN ONCOMING CAR AT NIGHT APPROACHES WITH ITS HIGH-BEAMS ON?
    6·1 answer
  • Of the two basic methods of data entry, keyboards use keystrokes to enter data and instructions; what is the nonkeyboard method
    8·1 answer
  • 18) choose which article title would most likely be described by the database subject headings victims of famine, ireland, histo
    14·1 answer
  • PreparedStatement ps = connection.prepareStatement("select firstName, mi, lastName from Student where lastName = ?"; ps.setStrin
    5·1 answer
  • Ali is in the hospital about to undergo a brain-imaging process that involves taking many x-rays from different angles aided by
    9·1 answer
  • in java Write a program with total change amount in pennies as an integer input, and output the change using the fewest coins, o
    13·1 answer
  • Select the correct answer.
    10·1 answer
  • What do you understand by the term polysome?​
    14·1 answer
  • When proofreading, you should do all of the following except _____.
    14·1 answer
  • A natural language processor comes across a sentence that contains the word “weightless.” The morphology component identifies th
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!