Answer:
All traffic is encrypted. No one on your network can see what is going on (except for knowing where those packets are going to).
The identity of the remote server can be verified using certificates. So you also know that it really is your bank that you are talking to.
Optionally (and not in wide-spread use), the identity of the client can also be verified using certificates. This would allow for secure login to a site using chip cards instead of (or in addition to) password
1st blank:task
2nd blank:transparency
Answer:
Extension lines are used to indicate the extension of a surface or point to a location preferably outside the part outline.
Explanation:
Answer:
it's a Jamaican slang
Explanation:
it depends on the wah it is used