1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Westkost [7]
3 years ago
15

What technology provides secure access to websites

Computers and Technology
2 answers:
wlad13 [49]3 years ago
6 0

The technology is HTTPS or Hypertext Transfer Protocol Secure

Artemon [7]3 years ago
5 0

Answer:

HyperText Transfer Protocol Secure (HTTPS)

Explanation:

HyperText Transfer Protocol Secure (HTTPS) is a method used <em>to ensure the secure communication between a user's browser and a web server</em>, is often used to make payments or accept them preventing them from being stolen by hackers.

I hope you find this information useful and interesting! Good luck!

You might be interested in
HELP PLEASE I WILL GIVE YOU 15 POINTS!
scoundrel [369]

Answer:

look up some stories if you can like about dogs or something and then write why you like animals then write about how much you need to know about dogs or cats to be a good dog/cat owner

Explanation:

I already gave you the two stories didn't I in your last questions?

4 0
3 years ago
According to the Bureau of Labor Statistics, how
Vladimir79 [104]

Answer:

one million

Explanation:

took test

7 0
3 years ago
In the Microsoft publisher application, words underlined in red are ____.
nydimaria [60]

In the Microsoft publisher application (as well as many other websites such as Brainly, Google docs, etc), words underlined in red are spelled incorrectly.

Whether you spelled it incorrectly or did not complete the words, as long as the word is not found in the dictionary, the word would be underlined with a red squiggly line.

~

4 0
3 years ago
Four categories of installer apps
Naddika [18.5K]

Answer:

I find 5 categories

Explanation:

1 Overview

2 Necessity

3 Types

4 Attended installation

4.1 Silent installation

4.2 Unattended installation

4.3 Headless installation

4.4 Scheduled or automated installation

4.5 Clean installation

4.6 Network installation

5 Installer

5.1 Bootstrapper

5.2 Common types

5.3 System installer

7 0
3 years ago
15. Feelings (maps, coins, clues, etc.) and the invisClue books were some innovative ways used to keep __________ players engage
Anit [1.1K]

Answer:

pong i could be wrong i think its right tho

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • Use search engines and websites to research the following WAN technologies to complete the table below:
    7·2 answers
  • Which is the correct formula to add the values in cells A1 and B1? A. SUM(A1+B1) B. =SUM(A1+B1) C. =SUMA1+B1 D. A1+B1
    9·2 answers
  • Match the part of motherboard to its function
    15·1 answer
  • Match each scenario to the absolute value expression that describes it. 1. the distance moved when going backwards five spaces i
    13·2 answers
  • How do u use this app?
    15·2 answers
  • In what other game can kids line up in a row
    6·1 answer
  • Write a program that keeps track of a simple inventory for a store. While there are still items left in the inventory, ask the u
    12·2 answers
  • You implement basic version control and go through the phase of creating a local repository. Initiate the commands to set up tha
    7·1 answer
  • Write a static method called split that takes an ArrayList of integer values as a parameter and that replaces each value in the
    12·1 answer
  • Verbs in the active and passive voice
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!