1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
il63 [147K]
3 years ago
10

What port is utilized by secure imap (imaps?

Computers and Technology
1 answer:
DedPeter [7]3 years ago
8 0
TCP port used for SSL Secured.
You might be interested in
The security administrator of ABC needs to permit Internet traffic in the host 10.0.0.2 and UDP traffic in the host 10.0.0.3. Al
koban [17]

Answer:

The correct selection is the letter C. The first ACL is denying all TCP traffic and the other ACLs are being ignored by the router.

Explanation:

In this case, the letter C is the right answer because with the first ACL exactly:

access-list 102 deny tcp any any

We are denying all traffic with the next line deny tcp any any, in this case, the others line are being ignored.

access-list 104 permit udp host 10.0.0.3 any

access-list 110 permit tcp host 10.0.0.2 eq www any

access-list 108 permit tcp any eq ftp any

For that nobody can access to the internet, the security administrator of ABC must change the first ACL.

5 0
3 years ago
What is the first character for a file or directory names if they should not be displayed by commands such as ls unless specific
riadik2000 [5.3K]

Answer: The .(dot) character

Explanation: in Linux, the period (dot) is short hand for the bash built in source. It will read and execute commands from a file in the current environment and return the exit status of the last command executed.

The .(dot) character is the first character for a file or directory names if they should not be displayed by commands such as ls unless specifically requested

4 0
3 years ago
The diagram shows the parts of a computer. In which part is data processing done?
notsponge [240]
  • control unit mainly processes tasks and most resources are managed here in the computer system.

  • central processing unit, ( CPU ) where most of the data processing is done and executes instructions.
3 0
2 years ago
A programmer tests the procedure with various inputs and finds multiple cases where it does not produce the expected output. whi
AnnZ [28]

Answer:

longestWord(["frog", "seagull", "mermaid"])

longestWord(["crown", "diamond", "castle"])

Brainlist pls!

6 0
2 years ago
The illegal copying of program​
Maru [420]

Answer:Software piracy

Explanation:

8 0
3 years ago
Other questions:
  • Impact of computer on education
    6·2 answers
  • This technology was developed in the 1980s and was a successful attempt to provide services for voice, video, and video traffic
    11·1 answer
  • Why is it difficult to enforce laws against intellectual theft?
    9·1 answer
  • Where are parameters such boot order, processor voltage, motherboard raid, hardware virtualization support, and overclocking con
    7·1 answer
  • In cell n2, enter a formula using the if function and a structured reference to determine if allison simoneau is eligible for tu
    11·1 answer
  • ___are designed to infect and cause damage to operating system files, computer registry, and other locations on the motherboard
    15·1 answer
  • 1.An algorithm used to find a value in an array is called a ______________.
    7·2 answers
  • What is the suffix of hollow?
    7·1 answer
  • (Print distinct numbers) Write a program that reads in integers separated by a space in one line and displays distinct numbers i
    8·1 answer
  • Consider the following method, which is intended to count the number of times the letter "A" appears in the string str.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!