1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ella [17]
3 years ago
14

The encapsulating security ______ protocol provides secrecy for the contents of network communications as well as system-to-syst

em authentication and data integrity verification.
Computers and Technology
1 answer:
Goshia [24]3 years ago
5 0

Answer:

payload

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

The encapsulating security payload (ESP) protocol is a standard protocol that provides secrecy for the contents (data) transmitted via network communications, as well as system-to-system authentication and data integrity verification so as to prevent unauthorized access.

Basically, the encapsulating security payload (ESP) protocol is a transport layer protocol that provides data confidentiality, integrity and authentication in IPv6 and IPv4 protocols.

You might be interested in
A(n) ________ collects data from various key business processes and stores the data in a single comprehensive data repository, u
xxTIMURxx [149]

Answer:

An Enterprise System

Explanation:

An enterprise system also refered to as an enterprise software is a computer software application used to handle the needs of a business or an enterprise examples are schools, production companies, government ministries and departments, charities etc.

The software provides all the business oriented services for the enterprise, services such as payment processing, students' information management, automated billing and payments etc.

Because enterprises will typically have different departments, the software is able to collect data from all the key business processes across all the departments into a single database which is useable according to different access privilages by all other parts of the enterprise.

3 0
3 years ago
write an algorithm that gets two values: the price for item A and the quantity purchased. The algorithm should then print the to
pochemuha

Answer:

Explanation:

price = eval(input("price of item: "))

quantity = eval(input("quantity of item: "))

sales_tax = 0.08 # 8% sales tax

total_cost = price*quantity

total_cost_with_tax = total_cost + total_cost*sales_tax

print("total cost: "+str(total_cost))

print("total cost + 8% sales tax: "+str(total_cost_with_tax))

5 0
4 years ago
While designing web pages for mobiles, the page content should be extensive such that the readers get the opportunity to explore
mixer [17]

Answer:

True

Explanation:

The readers need to know the aspects of the topic that will broaden their knowledge and idea. So when designing a web page it is very good to provide extensive content such as hyperlinks to related articles on the same topic. To broaden their reading scope.

However this should be done cautiously, not to provide facets that will end up distracting the importance and the core aspect of the main topic.

3 0
3 years ago
Read 2 more answers
Which access database object asks a question about the data stored in a database and displays specific fields and records that a
elena-14-01-66 [18.8K]
The Query object is used to asks a question about the data stored in a database and displays the specific fields and records that answer the question.

In code form, the select command is used for queries. 
6 0
3 years ago
You should always buy the biggest camera bag that you can find for extra equipment
zysi [14]
False bbfderaddfdffffgfgdhgft
5 0
4 years ago
Read 2 more answers
Other questions:
  • Define the method object inc_num_kids() for PersonInfo. inc_num_kids increments the member data num_kids.Sample output for the g
    11·1 answer
  • The structure of a language has five different components: __________ refers to the smallest unit of meaning in a language, wher
    12·1 answer
  • Which of the following representations in two's complement notation represents the largest value?
    12·2 answers
  • If i took my SIM card out of my phone and put it in a router then connect the router and my phone with Ethernet cable would the
    12·1 answer
  • Your task is to diagnose and correct the problem. In the computer, the top hard drive contains the operating system files. Troub
    14·1 answer
  • Which of the following operating systems includes a virtual assistant?<br> Group of answer choices
    8·1 answer
  • What is a sequence of graphic illustrations which represent the planned scenes for a video or animation?
    6·2 answers
  • Writing the E-mail:
    5·1 answer
  • Como se llama este icono de word
    9·1 answer
  • How to transfer word 2019 from one computer to another
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!