1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotykmax [81]
2 years ago
10

PLEASE HELP ASAP Which technology encrypts traffic between a web browser and a website?

Computers and Technology
2 answers:
scoundrel [369]2 years ago
8 0

Answer:

The answer should be CloudFlare

Wewaii [24]2 years ago
4 0

Hyper Text Transfer protocol works well with web application. It encrypts traffic between web browser and a website. The user might have seen often an http or https appears on the address bar. This is a protocol which helps to transfer information from client to the web server.

HTTPS is a secured connection established between the client and server. It is always recommended to access only secured website so that it prevents the user from hacking the content from the user’s machine or pass virus to the system.

You might be interested in
Which option helps you choose the design of a slide in a presentation?
lozanna [386]
Hello! The slide transition helps with the transitions of slides and the animation helps out with the words appearing on the screen in a more creative way. Therefore, C and D are out. The slide layout is the part where if you click on it, slide designs are shown for you to choose from. The shapes can be used for design, but it doesn't help if you're looking for the design of a slide. The answer is A: slide layout.
5 0
3 years ago
What do virtually all "phishing" emails have in common?
Arisa [49]
The name of your email/or dont have any name, asking for money, spelling mistakes, and sometimes a UNSUBSCRIBE button at the bottom of the email.
6 0
3 years ago
Write one line of code to print animals, an array of Animal objects.
oksian1 [2.3K]

Answer:

console.log(Animal);

Explanation:

The statement written above prints the array Animal which contains objects.There are two to three ways to print the array Animal in javascript. One of the method is written in the answer it prints the arrays in the console of the browser.

You can go to the console by pressing F12 and then clicking on the console.

Other methods to print are

  1. Simple write Animal after defining the array.
  2. Use alert.
  3. document.write()
7 0
3 years ago
Which of the following is the correct style tag for having the web page's text be aligned to the right?
uysha [10]

Answer:

B. style=text-align: right

Explanation:

text-align is a CSS property having 5 types of values. Each of values define below.

left - Aligns content to left.

right - Aligns content to right.

center - Centers the content.

justify - Depends on the width of the content, it will align itself to both left and righ

inherit - It specifies the the value of text-align should be taken from parent element.

8 0
3 years ago
Read 2 more answers
Between which zones and a DMZ should firewalls be placed? Choose two answers.
brilliants [131]

Answer:

Internal and External Zones

Explanation:

Demilitarized Zone (DMZ) in a network means that, we make sure the security of network at higher level as military make sure the security of their bases or zones.

In this type of network, The network of the internal organization (LAN) needs security from hackers and unauthorized users who are trying to access the resources and information from the network.

This network is divided into two major zones. A DMZ has been placed between two zones along with firewalls enhance the security of LAN Network from the networks on internet. These two zones are named as Internal and External Zone. The firewall between DMZ and External zones monitors the users from external networks on the internet who tries to access organization's network. Internal network monitors the traffic between DMZ and Internal LAN network.

4 0
3 years ago
Other questions:
  • Two fingers are assigned to six letters each. What fingers are they?
    9·1 answer
  • Which of the following correctly orders the investments from LOWER risk to HIGHER risk?
    7·2 answers
  • Using a network without the network owner's permission is known as ________.
    10·1 answer
  • A model release can be either oral or written down. true or false
    13·2 answers
  • A(n) _____ is a telephone facility that manages incoming calls, handling them based on the number called and an associated datab
    5·1 answer
  • Which of the following statements is correct?
    11·1 answer
  • The valid call to the function installApplication is
    5·1 answer
  • Design a class named Employee. The class should keep the following information in member variables:
    5·1 answer
  • Please help ASAP! will mark brianliest! 30 points!
    14·1 answer
  • Your team has provisioned an Auto Scaling Groups in a single Region. The Auto Scaling Group at max capacity would total 40 EC2 i
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!