1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotykmax [81]
3 years ago
10

PLEASE HELP ASAP Which technology encrypts traffic between a web browser and a website?

Computers and Technology
2 answers:
scoundrel [369]3 years ago
8 0

Answer:

The answer should be CloudFlare

Wewaii [24]3 years ago
4 0

Hyper Text Transfer protocol works well with web application. It encrypts traffic between web browser and a website. The user might have seen often an http or https appears on the address bar. This is a protocol which helps to transfer information from client to the web server.

HTTPS is a secured connection established between the client and server. It is always recommended to access only secured website so that it prevents the user from hacking the content from the user’s machine or pass virus to the system.

You might be interested in
Because the data was formatted the same in two inventory files, you decided to combine their contents into one file. Now you wan
snow_tiger [21]

Answer:

c. uniq

Explanation:

3 0
3 years ago
Doug grew up on a large farm in southwest Wisconsin. As a college graduation gift, Doug’s father gave him several hundred acres
IrinaVladis [17]

Answer: Sole Proprietorship.

Explanation:

This question wants to know what type of business is described in the scenario.

In a Sole Proprietorship, the owner of the business is essentially the business itself. They control all aspects of the business from the operating activities to the financial activities of the firm. This is usually the first stage business type in an entrepreneurship.

The definition of a sole proprietorship above fits with what Doug does. Doug is the owner of the farming business and seems to be handling all aspects of it by himself. This would therefore make it a sole proprietorship.

5 0
3 years ago
Many websites (mostly online shopping sites), monitor a person’s Internet browsing behavior, such as the websites we often visit
mamaluj [8]

Answer:

Yes, this pratice is ethical

Explanation:

You are freely choosing to go on to these websites and most websites inform you that they are doing this. Edward Snowden, told the world that goverments are spying on them. Most people did not have a problem with this. Since, most people have a way to inform themsevles about the practices on the websites(by reading the terms of serve) and people don't care about spying than this is in no way unethical practice.

7 0
3 years ago
A filter is limited to extracting data from a single table. <br> a. True <br> b. False
oksano4ka [1.4K]

<span>It is true that a filter is limited to extracting data from a single table.

</span><span>Extraction is the operation of copying data from a database into a file or onto a network connection. This is the first step of the ETT process: data must be extracted from the source system(s) so that this data may be subsequently transformed and loaded into the data warehouse.</span>

3 0
3 years ago
WNOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOW
beks73 [17]

Answer:

yes.

Explanation:

7 0
3 years ago
Other questions:
  • Before you take any medicine, _____ to see if it could affect your ability to drive.
    8·2 answers
  • What is the on board storage C:
    15·1 answer
  • Eye injuries usually occur as a result of all of the following things, EXCEPT:
    13·2 answers
  • Using an LCD projector to show an online video to a group of people is an example of:
    14·1 answer
  • fill down feature on a formula and you need to keep a cell reference the same which one will allow you to keep the same cell ref
    15·1 answer
  • Where can I easily find an easy app or program to use for making/editing videos?
    13·1 answer
  • When the ____ property of an object is set to False, the object will not appear on the form when the program starts.
    6·1 answer
  • Name two different ways you can bring up the my computer folder
    9·2 answers
  • This uses the gps methodology to predict the likely location of an offender's base of operation:
    8·1 answer
  • Which SCSI standard allows for the technique known as “hot swapping”? Ultra SCSI Original SCSI Serial SCSI Fast-Wide SCSI
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!