1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
creativ13 [48]
3 years ago
14

ted must send highly sensitive data over his pptp connection. what feature of pptp will give him the confidence that his data wo

nt be stolen in route
Computers and Technology
1 answer:
Mandarinka [93]3 years ago
5 0

Answer:

Encryption

Explanation:

PPTP (Point to Point Tunneling Protocol) is an old way of implementing networks, PPTP uses Generic routing encapsulation tunnel to encapsulate data sent on the network and Microsoft Point to Point Encryption (MPPE) those encryption mechanism ensures that data/packets sent through the network are encrypted.

You might be interested in
Anybody wants to join my pad let to talk about video games
Rus_ich [418]

Answer:

im in

Explanation:

8 0
2 years ago
Read 2 more answers
Which would you use to get the number of elements in a dictionary?
Vikentia [17]

The function use to get the number of element in a dictionary is len.

<h3>What is a dictionary?</h3>

Dictionaries are used to store data values in key-value pairs. Dictionary are ordered.

Dictionary in python are express as follows:

my_dict = {"name": "Michael", "age": 28, "school": "Oxford"}

Therefore, the length of the element of the dictionary can be gotten using the len() function.

Hence,

print(len(my_dict)) will give you the length of the element.

learn more on dictionary here: brainly.com/question/14120893

#SPJ11

8 0
1 year ago
I am having trouble figuring out if this is correct. Can someone please help me ASAP?
CaHeK987 [17]

Explanation:

The X's have been correctly placed in the chart

A surge suppressor, which is also commonly known as a surge protector, is an important equipment that helps prevent damage to electric components from an unexpected increase of voltage. Let’s assume that you are living in a county where the effective utility voltage is between 110 to 120 volts. Assume that the accepted peak voltage should not be anything higher than 170 volts. If there is a surge and this surge reaches peak levels of 170 volts and higher, surge suppressors should jump in and prevent the peak AC voltage from going above the threshold.

People tend to confuse line conditioners and surge suppressors. While surge suppressors protect components from surges, line conditioners are built to make up for the loss of voltage from the lines. It does so by storing some power energy. This stored energy can later be modified and used when the volts drops to the desired 110 volts.

A UPS has DC battery power that provides battery backup power when the electricity goes off or when the levels of voltage drop significantly. When the electricity goes off means that the voltage is at 0 volts and it is the work of the UPS to kick its backup power in.

6 0
3 years ago
The understanding of computer function?
Licemer1 [7]
A specific skill or work done and carried out by a computer in order to gain information
8 0
2 years ago
The cyclical, multistep process by which designers and engineers design, build, and taste a new product is called:
zzz [600]
The answer is Design Process.  <span>The cyclical, multistep process by which designers and engineers design, build, and taste a new product is called Design Process.   </span><span>There are multiple steps, including exploring, designing, planning, making, testing, and revising.</span>
7 0
3 years ago
Other questions:
  • Ead the following scenario and then answer the question.
    10·1 answer
  • If an attacker decides to implement a less obvious port-scan, or stealth attack, which of the following techniques would be appr
    14·1 answer
  • . The first step in devising security services and mechanisms is to develop a security policy True False
    11·1 answer
  • PHP is based on C rather than ______.
    5·1 answer
  • What does social protocol means in network?
    9·1 answer
  • En que se diferencia el software y el hardware
    7·2 answers
  • The "fathers of the Internet" are Vinton Cerf and ________. Select one: A. Tim Berners-Lee B. Bill Gates C. Robert Kahn D. Rober
    8·1 answer
  • Add Try/Catch error checking To make sure that the user enters valid values in your program. To catch negative values passed to
    9·1 answer
  • An office uses an application to assign work to its staff members. The application uses a binary sequence to represent each of 1
    9·1 answer
  • Hyperlink is a term used to refer to the specific manner of specifying the address of a website. Write reason for true or false.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!