1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Westkost [7]
3 years ago
15

What technology provides secure access to websites

Computers and Technology
2 answers:
wlad13 [49]3 years ago
6 0

The technology is HTTPS or Hypertext Transfer Protocol Secure

Artemon [7]3 years ago
5 0

Answer:

HyperText Transfer Protocol Secure (HTTPS)

Explanation:

HyperText Transfer Protocol Secure (HTTPS) is a method used <em>to ensure the secure communication between a user's browser and a web server</em>, is often used to make payments or accept them preventing them from being stolen by hackers.

I hope you find this information useful and interesting! Good luck!

You might be interested in
____ is a technique for confirming that q received packet or frame is likely to match what was sent
hammer [34]

Answer:

C. Error checking

Explanation:

I hope this helps

6 0
2 years ago
The process in which a server is partitioned into smaller components virtually.
ExtremeBDS [4]
The answer is Allocation
5 0
3 years ago
Doe's anyone know how to access developer mode on a Chromebook laptop if enterprise enrollment blocks it?
Mekhanik [1.2K]
♥ <span>Boot your Chromebook into recovery Mode
(Escape refresh and power keys all need to be help down)
It </span><span>will then  reboot into recovery mode
♥ </span><span>Press Ctrl+D at the recovery screen
♥ </span><span>To turn the Verification off you will need to press the enter button.
♥ and then you have it :D 

</span>
8 0
3 years ago
Read 2 more answers
PLEASE HELP WITH MY COMPUTER
qaws [65]

Answer:

try powering it off the turn it back on

Explanation:

5 0
3 years ago
Read 2 more answers
A user deletes a message from a mailbox while on a desktop. What happens to the email message on the user's synchronized devices
gulaghasi [49]

Answer:

Explanation:

Depends on the configuration of the email because there are two protocols POP and IMAP, the most recent protocol is IMAP, we can delete an email and this It moves to a To be Deleted folder, this happens because the email is stored in the server, but with the protocol POP the email is stored in the server and downloaded to the application, if you delete an email, this is deleted in all devices.

8 0
3 years ago
Read 2 more answers
Other questions:
  • What is the difference between Data and information?​
    7·1 answer
  • While working a night job at a call center, Eric creates an app called EatOut, which can be used to place orders at restaurants,
    14·1 answer
  • Why when i click home on iphone i still at my grandma house
    11·2 answers
  • Each device attached to your computer comes with a special program called a(n ________ that enables the device and operating sys
    15·1 answer
  • 3.17 (LAB) Ch 5 Warm up: Drawing a right triangle (Python 3) This program will output a right triangle based on user specified h
    10·1 answer
  • What is the easiest way to deploy a C++ program to a user’s computer? a. Copy the source code to the user’s computer and then co
    13·1 answer
  • It is a data being transported on a network​
    13·1 answer
  • PLEASE I NEED HELP WITH THIS, IS FOR TODAY
    10·2 answers
  • Why do you want to work from our company?​
    9·2 answers
  • 10.13 lab 10c: output range with increment of 5 write a program whose input is two integers. output the first integer and subseq
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!