1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natka813 [3]
3 years ago
7

What is the web of trust

Computers and Technology
2 answers:
kodGreya [7K]3 years ago
7 0
D. A group of reviewers with your highest ratings
Oksana_A [137]3 years ago
4 0

Answer:

A group of reviewers with your highest rating

Explanation:

A web of trust is kind of a crowd sourcing platform that helps site users to see how trustworthy a website is based on the ratings of other users and also enables the user of the site to review the sites as well.

It is a crowd sourcing in the sense that it depends on the ratings of a group of reviewers with highest ratings on a website to determine how safe and trustworthy the site is or will be. it doesn't depend on the ratings a specific group of experts. The higher the ratings the safer the website is said to be.

You might be interested in
Select the correct answer. Which character type is usually seen more often in games for young children than for the other age gr
garri49 [273]

Answer:

B. Animal

Explanation:

Just took the test on Plato

#PlatoLivesMatter

7 0
3 years ago
Which activity represents a violation of the licensing agreement?
Lena [83]
A) <span>unauthorized duplication of software </span>
6 0
3 years ago
Read 2 more answers
Which is used to identify the network portion and the host portion of an ip address?
qwelly [4]
<span>subnet mask is used to identify the network portion and the host portion of an ip address.</span>
3 0
3 years ago
Patrick manages the cloud services that are used by a small hospital system. He knows that there are a lot of laws and regulatio
svet-max [94.6K]

Answer:

a. HIPAA

Explanation:

HIPPA represents the Health Insurance Portability and Accountability Act that of the United States which becomes mandatory for protecting the medical data in any form.

Also in the case of data protection that represent the general regulations, PCI DSS, GDPR etc would be used

So the option a is correct

hence, all the other options are wrong

8 0
3 years ago
3. Describe what a pre-processor does in a network-based IDS tool such as Snort. Demonstrate your understanding of this function
MrRissso [65]

Answer:

Pre-processors look at organize traffic and screens parcel transmissions by examining andreassembling divided data.Frag2:preprocessor that battles against IP fracture attacks.Attackers sends a fragmentedTCP bundle with header data that gets entrance through a firewall.At the equivalent time,other parcels with vindictive information "slip" by the firewall undetected because of the fragmentationbeing so little by overwriting the header information.The frag2 pre-processor is specificallydesigned to break down bundle discontinuity to search out noxious information in the sections, which iswhy this pre-processor ought to never be turned off.Stream4:preprocessor Snort uses to coordinate assault marks over numerous packets.Anattacker endeavors to send different parcels into the system conveying parts of the attackpayload which are required to be reassembled by the host so as to start an attack.Stream4 stores the bits of the mark until all bundles are transmitted.Once they are alltransmitted, Stream4 finishes the signature and an alarm is created.

Explanation:

8 0
3 years ago
Other questions:
  • Match each logical function with its description. AND COUNTIF SUMIF IF tests for a certain condition and returns one of two valu
    7·1 answer
  • Every time you are asked to work with others, you are being asked to:
    6·2 answers
  • The "network of networks," consisting of LANs (Local Area Networksnetworks connecting two or more computers, usually within the
    5·1 answer
  • Write a method called printRange that accepts two integers as arguments and prints the sequence of numbers between the two argum
    6·1 answer
  • The jailbreak property that, if the user turns the device off and back on, the device will start up completely, and the kernel w
    15·1 answer
  • How can netiquette help you communicate when texting or instant messaging?
    6·1 answer
  • When compared to defender and analyzer firms, early adopters of new technologies tend to be?
    13·2 answers
  • Assume the user responds with a 3 for the first number and a 4 for the second number.
    13·1 answer
  • Write 2 paragraphs. 1 comparing Shrek the movie and Shrek the musical and another contrasting them.
    12·2 answers
  • Write algorithm and flowchart for the following<br>a.find the sum and average of any four numbers ​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!