1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tigry1 [53]
3 years ago
8

Hioo ^U^

Computers and Technology
1 answer:
AlexFokin [52]3 years ago
6 0

Answer:

Hie ......... . thanks for the points

Have a good day

You might be interested in
Whats the difference between Input and Output? Give and example of an example on a M:B​
Akimi4 [234]

Answer:

Entrar en algún lugar no es como irse de algún lugar, o qué tipo de pregunta significa para mi acción

3 0
3 years ago
Traffic that is encrypted will typically pass by an intrusion prevention system untouched.a. Trueb. False
Sauron [17]

Answer:

A. True

Explanation:

Data encryption is a technique that converts clear text into unreadable text and transmitted over a network, to prevent attackers from understanding the information send to the receiver, which can only be deciphered by the receiver and the sender with special keys or software.

An intrusion prevention system is used to mitigate cyber attackers by preventing unwanted packets that could be malicious, from entering the network.

The intrusion prevention system can only see clear text data. For this reason, an encrypted text can pass through the prevention system untouched.

3 0
3 years ago
Heeeeeeeelp :)<br> thx<br> jfdyiusjmkdsuiho;dmcvrvho;j
anastassius [24]

Answer:

I think option C is correct

7 0
3 years ago
Read 2 more answers
Which security control is most helpful in protecting against eavesdropping on wireless LAN (WLAN) data transmissions that would
3241004551 [841]

Answer:

D. Applying strong encryption

Explanation:

Strong cryptography or cryptographic-ally strong are general terms applied to cryptographic systems or components that are considered highly resistant to cryptanalysis.One cryptographic cipher has been mathematically proven to be unbreakable when it is used correctly, but it is only very rarely used.

6 0
3 years ago
Explain how the internet works​
yulyashka [42]

How does the Internet Work?

The Internet works through a packet routing network in accordance with the Internet Protocol (IP), the Transport Control Protocol (TCP) and other protocols.

Hope this helps you!

5 0
2 years ago
Read 2 more answers
Other questions:
  • You can use Facebook's live feed tool to broadcast content as you post it
    8·2 answers
  • To change the background color of a page, which tab would you use?
    15·2 answers
  • ________ symbol is used in the "Advanced" section of the time range picker to round down to nearest unit of specified time.
    8·1 answer
  • Is a fundamental building block of a relational database because this object stores all of the data
    15·1 answer
  • Why does air have weight?
    6·2 answers
  • What are some fun games to play on you phone?
    12·2 answers
  • In this challenge, write a function to add two floating point numbers. Determine the integer floor of the sum. The floor is the
    8·1 answer
  • In the following code: function drawCircle(radius, x, y, color) { var circle = new Circle(radius); circle.setPosition(x, y); cir
    7·1 answer
  • What is computer give definition ​
    14·2 answers
  • Bloxburg Build can anyone help me
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!